CompTIA Security+: Enterprise Infrastructure Security Principles

CompTIA Security+    |    Beginner
  • 10 videos | 43m 16s
  • Includes Assessment
  • Earns a Badge
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
This course is a critical component of modern technical controls and countermeasures, as many of the technologies covered represent the daily technical activities of security practitioners, operators, and administrators. Begin by discovering various infrastructure security considerations like device placement, security zones, and failure modes. Then, you will compare network appliances and explore port security and firewalls. Next, you will examine virtual private networks (VPNs) and IP security (IPSec). Finally, you will investigate transport layer security (TLS), software-defined wide area networks (SD-WANs), and secure access service edge (SASE). This course is part of a series that prepares you for the CompTIA Security+ (SY0-701) exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Describe infrastructure considerations like device placement, security zones, attack surface, connectivity, failure modes, and device attributes
    Compare various network appliances, including jump servers, proxy servers, intrusions prevention systems (ipss)/intrusion detection systems (idss), sensors, and load balancers
    Define port security, including ieee 802.1x, and extensible authentication protocol (eap)
    Compare firewall types, including access control lists (acls), unified threat management (utm), next-generation firewall (ngfw), layer 4/layer 7, and web application firewall (waf)
  • Describe a vpn
    Describe ipsec for ipv4 and ipv6
    Define transport layer security
    Describe software-defined wide area networks (sd-wans) and secure access service edge (sase)
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 30s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 4m 4s
    After completing this video, you will be able to describe infrastructure considerations like device placement, security zones, attack surface, connectivity, failure modes, and device attributes. FREE ACCESS
  • Locked
    3.  Network Appliances
    8m 6s
    Upon completion of this video, you will be able to compare various network appliances, including jump servers, proxy servers, intrusions prevention systems (IPSs)/intrusion detection systems (IDSs), sensors, and load balancers. FREE ACCESS
  • Locked
    4.  Port Security
    6m 31s
    After completing this video, you will be able to define port security, including IEEE 802.1X, and Extensible Authentication Protocol (EAP). FREE ACCESS
  • Locked
    5.  Firewall Types
    8m 58s
    Upon completion of this video, you will be able to compare firewall types, including access control lists (ACLs), unified threat management (UTM), next-generation firewall (NGFW), layer 4/layer 7, and web application firewall (WAF). FREE ACCESS
  • Locked
    6.  Examining Virtual Private Networks (VPNs)
    4m 58s
    After completing this video, you will be able to describe a VPN. FREE ACCESS
  • Locked
    7.  Examining IP Security (IPsec)
    3m 51s
    Upon completion of this video, you will be able to describe IPsec for IPv4 and IPv6. FREE ACCESS
  • Locked
    8.  Transport Layer Security (TLS)
    2m 22s
    After completing this video, you will be able to define transport layer security. FREE ACCESS
  • Locked
    9.  SD-WAN and SASE
    3m 24s
    Upon completion of this video, you will be able to describe software-defined wide area networks (SD-WANs) and secure access service edge (SASE). FREE ACCESS
  • Locked
    10.  Course Summary
    31s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.8 of 6 users Rating 4.8 of 6 users (6)
Rating 4.8 of 52 users Rating 4.8 of 52 users (52)
Rating 4.4 of 27 users Rating 4.4 of 27 users (27)