CompTIA Security+: Security Concepts in an Enterprise Environment

CompTIA    |    Intermediate
  • 13 videos | 40m 22s
  • Includes Assessment
  • Earns a Badge
Rating 4.4 of 234 users Rating 4.4 of 234 users (234)
As a security specialist, you need to be familiar with and apply a range of security concpets related to operating in an enterprise environment. In this course, you'll explore enterprise security factors like change and configuration management, as well as data sovereignty, protection, and loss prevention. You'll learn about hardware security modules, geographical considerations, cloud access security brokers. You'll move on to examine response and recovery controls, SSL/TLS inspection, and site resiliency. Finally, you'll learn about deception and disruption techniques using honeypots, honeyfiles, honeynets, fake telemetry, and DNS sinkholes. This course can be used in preparation for the CompTIA Security+ SY0-601 certification exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Define change and configuration management concepts like diagram, baseline configurations, standard naming conventions, and documenting the ip schema
    Describe data sovereignty, the conversion and storage of data in binary digital form, and how data is subject to the laws of the located country
    Describe data protection including topics like data loss prevention, masking, and encryption
    Identify key roles of hardware security modules (hsms) in providing hardened, tamper-resistant devices that generate keys, encrypt and decrypt data, and create and verify digital signatures
    Recognize geographic factors such as jurisdictions, privacy laws, import-export restrictions, and cryptographic regulations
    Describe the on-premises or cloud-based casb security policy enforcement points that are set between cloud service providers and their consumers
  • Compare response and recovery controls as a part of enterprise business continuity and disaster recovery
    Describe ssl/tls inspection accomplished by next-generation firewalls, waf solutions, and other cloud-based techniques
    Describe hashing and application programming interfaces and the importance of digitally signing all api calls
    Describe types of site resiliency including hot site, cold site, and warm site solutions
    Define deception and disruption techniques using honeypots, honey tokens, honeyfiles, honeynets, fake telemetry, and dns sinkholes
    Discover the key concepts covered in this course

IN THIS COURSE

  • 1m 40s
  • 5m 23s
    During this video, you will learn how to define change and configuration management concepts like diagrams, baseline configurations, standard naming conventions, and documenting the IP schema. FREE ACCESS
  • Locked
    3.  Data Sovereignty
    2m 58s
    Upon completion of this video, you will be able to describe data sovereignty, the conversion and storage of data in binary digital form, and how data is subject to the laws of the country in which it is located. FREE ACCESS
  • Locked
    4.  Data Protection
    5m 6s
    After completing this video, you will be able to describe data protection, including topics like data loss prevention, masking, and encryption. FREE ACCESS
  • Locked
    5.  Hardware Security Modules
    2m 4s
    During this video, you will learn how to identify key roles of hardware security modules (HSMs) in providing hardened, tamper-resistant devices that generate keys, encrypt and decrypt data, and create and verify digital signatures. FREE ACCESS
  • Locked
    6.  Geographical Considerations
    3m 19s
    Upon completion of this video, you will be able to recognize geographic factors such as jurisdictions, privacy laws, import-export restrictions, and cryptographic regulations. FREE ACCESS
  • Locked
    7.  Cloud Access Security Brokers
    1m 26s
    Upon completion of this video, you will be able to describe the on-premises or cloud-based CASB security policy enforcement points that are set between cloud service providers and their consumers. FREE ACCESS
  • Locked
    8.  Response and Recovery Controls
    3m 46s
    In this video, you will learn how to compare response and recovery controls as part of enterprise business continuity and disaster recovery. FREE ACCESS
  • Locked
    9.  SSL/TLS Inspection
    2m 15s
    After completing this video, you will be able to describe SSL/TLS inspection accomplished by next-generation firewalls, WAF solutions, and other cloud-based techniques. FREE ACCESS
  • Locked
    10.  Hashing and API Considerations
    3m 20s
    Upon completion of this video, you will be able to describe hashing, application programming interfaces, and the importance of digitally signing all API calls. FREE ACCESS
  • Locked
    11.  Site Resiliency
    3m 28s
    After completing this video, you will be able to describe types of site resiliency including hot site, cold site, and warm site solutions. FREE ACCESS
  • Locked
    12.  Deception and Disruption
    4m 42s
    Learn how to define deception and disruption techniques using honeypots, honey tokens, honeyfiles, honeynets, fake telemetry, and DNS sinkholes. FREE ACCESS
  • Locked
    13.  Course Summary
    54s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.4 of 5 users Rating 4.4 of 5 users (5)
Rating 4.6 of 30 users Rating 4.6 of 30 users (30)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 3.5 of 302 users Rating 3.5 of 302 users (302)
Rating 4.5 of 441 users Rating 4.5 of 441 users (441)
Rating 4.2 of 180 users Rating 4.2 of 180 users (180)