CompTIA Security+: Enterprise Infrastructure Security Principles
CompTIA Security+
| Beginner
- 10 videos | 43m 16s
- Includes Assessment
- Earns a Badge
This course is a critical component of modern technical controls and countermeasures, as many of the technologies covered represent the daily technical activities of security practitioners, operators, and administrators. Begin by discovering various infrastructure security considerations like device placement, security zones, and failure modes. Then, you will compare network appliances and explore port security and firewalls. Next, you will examine virtual private networks (VPNs) and IP security (IPSec). Finally, you will investigate transport layer security (TLS), software-defined wide area networks (SD-WANs), and secure access service edge (SASE). This course is part of a series that prepares you for the CompTIA Security+ (SY0-701) exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDescribe infrastructure considerations like device placement, security zones, attack surface, connectivity, failure modes, and device attributesCompare various network appliances, including jump servers, proxy servers, intrusions prevention systems (ipss)/intrusion detection systems (idss), sensors, and load balancersDefine port security, including ieee 802.1x, and extensible authentication protocol (eap)Compare firewall types, including access control lists (acls), unified threat management (utm), next-generation firewall (ngfw), layer 4/layer 7, and web application firewall (waf)
-
Describe a vpnDescribe ipsec for ipv4 and ipv6Define transport layer securityDescribe software-defined wide area networks (sd-wans) and secure access service edge (sase)Summarize the key concepts covered in this course
IN THIS COURSE
-
30sIn this video, we will discover the key concepts covered in this course. FREE ACCESS
-
4m 4sAfter completing this video, you will be able to describe infrastructure considerations like device placement, security zones, attack surface, connectivity, failure modes, and device attributes. FREE ACCESS
-
8m 6sUpon completion of this video, you will be able to compare various network appliances, including jump servers, proxy servers, intrusions prevention systems (IPSs)/intrusion detection systems (IDSs), sensors, and load balancers. FREE ACCESS
-
6m 31sAfter completing this video, you will be able to define port security, including IEEE 802.1X, and Extensible Authentication Protocol (EAP). FREE ACCESS
-
8m 58sUpon completion of this video, you will be able to compare firewall types, including access control lists (ACLs), unified threat management (UTM), next-generation firewall (NGFW), layer 4/layer 7, and web application firewall (WAF). FREE ACCESS
-
4m 58sAfter completing this video, you will be able to describe a VPN. FREE ACCESS
-
3m 51sUpon completion of this video, you will be able to describe IPsec for IPv4 and IPv6. FREE ACCESS
-
2m 22sAfter completing this video, you will be able to define transport layer security. FREE ACCESS
-
3m 24sUpon completion of this video, you will be able to describe software-defined wide area networks (SD-WANs) and secure access service edge (SASE). FREE ACCESS
-
31sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.