Aspire Journeys
652 Security Architect Intermediate KSAT Journey
- 52 Courses | 55h 45m 6s
This journey ensures that the stakeholder security requirements necessary to protect the organization's mission and business processes are adequately addressed in all aspects of enterprise architecture including reference models, segment and solution architectures, and the resulting systems supporting those missions and business processes.
652 Security Architect Intermediate
This track ensures that the stakeholder security requirements necessary to protect the organization’s mission and business processes are adequately addressed in all aspects of enterprise architecture including reference models, segment and solution architectures, and the resulting systems supporting those missions and business processes.
- 52 Courses | 55h 45m 6s
COURSES INCLUDED
Artificial Intelligence: Human-computer Interaction Overview
In developing AI (artificial intelligence) applications, it is important to play close attention to human-computer interaction (HCI) and design each application for specific users. To make a machine intelligent, a developer uses multiple techniques from an AI toolbox; these tools are actually mathematical algorithms that can demonstrate intelligent behavior. The course examines the following categories of AI development: algorithms, machine learning, probabilistic modelling, neural networks, and reinforcement learning. There are two main types of AI tools available: statistical learning, in which large amount of data is used to make certain generalizations that can be applied to new data; and symbolic AI, in which an AI developer must create a model of the environment with which the AI agent interacts and set up the rules. Learn to identify potential AI users, the context of using the applications, and how to create user tasks and interface mock-ups.
14 videos |
55m
Assessment
Badge
Artificial Intelligence: Human-computer Interaction Methodologies
Human computer interaction (HCI) design is the starting point for an artificial intelligence (AI) program. Overall HCI design is a creative problem-solving process oriented to the goal of satisfying largest number of customers. In this course, you will cover multiple methodologies used in the HCI design process and explore prototyping and useful techniques for software development and maintenance. First, learn how the anthropomorphic approach to HCI focuses on keeping the interaction with computers similar to human interactions. The cognitive approach pays attention to the capacities of a human brain. Next, learn to use the empirical approach to HCI to quantitatively evaluate interaction and interface designs, and predictive modeling is used to optimize the screen space and make interaction with the software more intuitive. You will examine how to continually improve HCI designs, develop personas, and use case studies and conduct usability tests. Last, you will examine how to improve the program design continually for AI applications; develop personas; use case studies; and conduct usability tests.
14 videos |
56m
Assessment
Badge
AWS SysOps Associate 2022: Key & Certificate Management
Using cryptographic solutions helps prevent data tampering and exposure of sensitive data to unauthorized parties, ensuring data confidentiality and integrity. AWS supports the creation and management of encryption keys and digital security certificates. In this course, discover how cryptography can provide data integrity and confidentiality. Then examine the public key infrastructure (PKI) hierarchy and how certificates can be used to secure AWS services. Next, work with AWS Key Management Service (AWS KMS) to manage encryption keys and AWS Certificate Manager to create a private certificate authority (CA) and issue PKI certificates. Finally, practice renewing certificates, enabling HTTPS, and encrypting an Elastic Block Store (EBS) volume. This course can be used to prepare for exam SOA-C02, AWS Certified SysOps Administrator - Associate.
13 videos |
1h 6m
Assessment
Badge
CompTIA Cloud Essentials+: Cloud Design Considerations
Monitoring and benchmarking are essential when designing cloud that considers disaster recovery, high availability, and failover. In this course, you'll recognize the cloud design considerations that provide the highest possible availability, the levels of redundancy that ensure services continue in the case of a disaster, and the procedures that can be implemented for disaster recovery and business continuity. Moving on, you'll examine common deployment architectures to address availability and resiliency, the parameters and performance indices monitored at each cloud deployment level, and the goals of benchmarking. Next, you'll examine the different failover scenarios prevalent in cloud and the prominent use cases for placement groups and single and multiple availability zones. You'll configure EC2 Linux instances, install the Iperf network benchmark tool, and test TCP and UDP network performance. Lastly, you'll benchmark network throughput on an Amazon EC2 Windows instance and configure active-passive failover with multiple primary and secondary record resources. This course can be used in preparation for the CompTIA Cloud Essentials+ (CLO-002) certification exam.
14 videos |
1h
Assessment
Badge
CompTIA Cloud Essentials+: Cloud Governance & Securing Data
Cloud consumers look for cloud services that follow regulations and core principles for maintaining data security and confidentiality. In this course, you'll investigate the cloud computing policy, which protects sensitive personal and confidential business data. You'll examine standard operating features, resource management, and security implementation checklist items and best practices for cloud computing. You'll then practice implementing policy-based access control for cloud computing. Moving on, you'll outline how to implement data sovereignty. You'll explore the international cloud computing standards, integrated vulnerability assessment solutions, and data security and privacy implementation in cloud computing. Finally, you'll outline how to implement and secure data and ensure availability in the cloud. You'll study the layers of security that can be implemented in the cloud, the cloud identity logs that help track events impacting cloud environments, and the OWASP Top 10 data-level authorization methods used to secure resources.
18 videos |
1h 41m
Assessment
Badge
CompTIA Cloud+: Cloud Architecture & Models
The cloud has various deployment and service models that can help your organization design and create your very own cloud strategy based on needs. First, you'll learn about the available cloud deployment models such as public, private, hybrid, community, and virtual public clouds, as well as multi-cloud and multitenancy environments. Next, you'll examine cloud service models such as Infrastructure as a Service, Platform as a Service, and Software as a Service. Finally, you'll learn about advanced topics such as the Internet of Things, serverless computing, machine learning, artificial intelligence, and the shared responsibility model. This course is one of a collection of courses that prepares learners for the CompTIA Cloud+ (CV0-003) certification.
12 videos |
1h 10m
Assessment
Badge
CompTIA Cloud+: Cloud Identity & Access Management
Identity and access management is crucial to securing resources and ensuring the resources are used by the correct people. In this course, you'll learn about some of the security resources that are available for performing and enforcing identity and access management. First, you'll examine identity and access management, including user identification, authorization, and privileged access management. You'll learn how to use the Lightweight Directory Access Protocol to manage access to resources. Next, you'll explore how identity federation can be used to manage user identities and how certificate management can be performed using certificate authorities, registration authorities, certificate databases, certificate stores, and key archival servers. You'll then move on to learn about multi-factor authentication, single sign-on, Public Key Infrastructure, as well as secret and key management. Finally, you'll learn about the components that can be used to perform incident response preparation and incident response procedures such as evidence acquisition, chain of custody, and root cause analysis. This course is one of a collection of courses that prepares learners for the CompTIA Cloud+ (CV0-003) certification.
12 videos |
1h 13m
Assessment
Badge
CompTIA Cloud+: Cloud Troubleshooting Methodologies
Being able to troubleshoot cloud and network issues is important when trying to resolve failures or operational difficulties. In this course, you'll learn to use troubleshooting methodologies to resolve common cloud issues. First, you'll examine how to resolve cloud related issues using the troubleshooting methodology. Next, you'll explore how to resolve network security group misconfigurations issues and network connectivity issues. You'll then move on to learn about resolving network routing and firewall connectivity issues. You'll learn about the tools that you can use to troubleshoot and resolve network issues. Finally, you'll learn resource utilization, application performance, and load balancing performance tuning. This course is one of a collection of courses that prepares learners for the CompTIA Cloud+ (CV0-003) certification.
12 videos |
1h 22m
Assessment
Badge
Google Professional Cloud Architect: Designing for Google Cloud Compliance
Compliance is a significant concern for many organizations, and many have historically failed to protect data adequately. In this course you will explore how governance has come to protect data, such as health records, through legislation like HIPAA and COPPA. Then, discover how commercial interests have helped bolster financial stability by setting standards of protecting data via certifications like Personally Identifiable Information (PII) and Payment Card Industry Data Security Standard (PCI DSS) that allow customers and businesses to trust you. In addition, there are specific industry certifications that may need to be met depending on the function of the business you run, rather than the data you keep. You will also focus on the need to maintain careful auditing standards for the integrity of any legal disputes that might arise. Finally, you will focus on use cases that you can expect to encounter in an exam environment. This course is one of a collection that prepares learners for the Google Professional Cloud Architect exam.
12 videos |
59m
Assessment
Badge
Business Continuity: Cloud Integration
There are many factors to consider when integrating with a cloud computing environment. In this 14-video course, you will explore cloud data storage types, cloud security concepts, how to evaluate cloud service providers, and cloud infrastructure components. To begin, you will explore the six key stages in the cloud secure data lifecycle: create, store, use, share, archive, and destroy. Learn to recognize key access control considerations, and list network security concepts such as data and media sanitization. Next, you will examine virtualization security concepts such as hypervisor and container security. View the common threats against cloud computing infrastructure, and describe the considerations when evaluating cloud service providers. Learners then move on to the physical environment, and common cloud infrastructure components such as storage, network, virtualization, and compute. Learn to recognize how to analyze cloud risks, and list data security strategies such as encryption and key management. Also, you will explore data discovery techniques; data rights management, and finally, information rights management.
14 videos |
1h 3m
Assessment
Badge
Business Continuity: Secure Cloud Computing
In this 14-video course, learners will discover principles and concepts used to ensure secure cloud computing. Topics include disaster recovery, cloud security concepts, and retention. Begin by examining the requirements for business continuity strategy; recognize requirements for disaster recovery strategy, and recognize considerations when moving applications to the cloud. Learn how to differentiate between data ownership and data custody, and explore key legal considerations when moving to the cloud. Next, learn about the importance of performing a cost-benefit analysis, and then recognize the factors that can impact confidentiality, integrity, data integrity, and availability of cloud data. This leads into cloud offering services, and a look at benefits of cloud offerings such as Amazon Web Services (AWS) and Azure. Recognize functional security requirements such as portability, interoperability, and vendor lock-in. Design and plan security controls including on-premises physical controls, virtualization protection, and authorization. The final two tutorials examine the importance of retention policies and archiving procedures, and the considerations relating to traceability and accountability such as logging, event sources, and chain of custody.
14 videos |
48m
Assessment
Badge
CompTIA Cybersecurity Analyst+: Network Security Concepts
Cybersecurity policies often require detailed network configuration changes and additions. Technicians must be proficient with the configuration and management of various TCP/IP protocols. In this course, I will start by discussing the Open Systems Interconnection (OSI) model, network switching, and network access control. Next, I'll discuss the TCP/IP protocol suite as well as IPv4 and IPv6 addressing. I will then discuss network routing, dynamic host configuration protocol (DHCP), domain name system (DNS) and Wi-Fi authentication methods. Lastly, I will cover virtual private networks (VPNs), IP Security (IPsec) and network time synchronization. This course can be used to prepare for the CS0-003: CompTIA Cybersecurity Analyst+ (CySA+) exam.
14 videos |
1h 29m
Assessment
Badge
CompTIA Cybersecurity Analyst+: Managing Network Settings
Modern IT solutions communicate over various types of networks. Cybersecurity analysts must be able to configure and secure the ways that devices communicate over these networks. In this course, I will begin by creating on-premises and cloud-based virtual networks, followed by managing IP addressing on Linux, Windows, and in the cloud. Next, I will manage routing table entries in the cloud and implement domain name system (DNS) and Dynamic Host Configuration Protocol (DHCP) security. Lastly, I will harden a Wi-Fi router and configure IPsec in Windows. This course can be used to prepare for the CS0-003: CompTIA Cybersecurity Analyst+ (CySA+) exam.
11 videos |
59m
Assessment
Badge
CompTIA Cybersecurity Analyst+: Cloud Computing & Cybersecurity
Cloud computing is an integral part of IT solutions for individuals and organizations. A knowledge of how cloud computing services are deployed and managed is a requirement for securing cloud-based resources. In this course, I will start by discussing cloud computing deployment models, such as public and private clouds, followed by discussing various cloud computing service models. Next, I will cover a variety of cloud computing security solutions, and I will deploy Linux and Windows cloud-based virtual machines. I will then deploy a web application in the cloud, cover the Cloud Controls Matrix (CCM) security controls, and work with Microsoft Azure managed identities. Lastly, I will discuss and configure a content delivery network (CDN). This course can be used to prepare for the CS0-003: CompTIA Cybersecurity Analyst+ (CySA+) exam.
12 videos |
1h 10m
Assessment
Badge
CompTIA Cybersecurity Analyst+: Data Security Standards
To remain compliant with relevant data privacy laws and regulations, organizations must have a way of identifying sensitive data and implementing security controls to protect that data. In this course, explore how physical security is related to digital data security, examples of personally identifiable information (PII), and how data loss prevention (DLP) solutions can prevent data exfiltration. Next, learn about common data privacy regulations and standards, including GDPR, HIPAA, and PCI DSS. Finally, discover how to use Amazon Macie and File Server Resource Manager to discover and classify sensitive information and learn about the importance of service level objectives (SLOs) and service level agreements (SLAs). This course can be used to prepare for the CS0-003: CompTIA Cybersecurity Analyst+ (CySA+) exam.
11 videos |
1h 3m
Assessment
Badge
CompTIA Cybersecurity Analyst+: Threat Intelligence Information
Cybersecurity analysts and security tools can reference a variety of threat intelligence sources to keep up to date with the latest threats and mitigations. These can be used to help keep organization security policies as effective as possible. In this course, examine different threat intelligence sources, the common vulnerabilities and exposures (CVEs) website, and the MITRE ATT&CK knowledge base. Next, discover how the OWASP Top 10 can help harden vulnerable web applications, how advanced persistent threats (APTs) are executed, and common ISO/IEC standards. Finally, learn how to analyze CIS benchmark documents, the Common Vulnerability Scoring System (CVSS), common organization security policy structures, and how organizational culture relates to IT security. This course can be used to prepare for the CS0-003: CompTIA Cybersecurity Analyst+ (CySA+) exam.
12 videos |
1h 9m
Assessment
Badge
CompTIA Cybersecurity Analyst+: Business Continuity Planning
Organizations must prepare in advance for the inevitable disruption of business operations. This means proactive planning to not only prevent disruptions but also manage them to reduce their negative impact. In this course, you'll begin by exploring common characteristics of a business continuity plan (BCP) and how to conduct a business impact analysis (BIA). You will then consider disaster recovery and incident response plans and focus on incident response activities such as escalation, eradication, and containment. Next, discover the importance of lessons learned from past incidents in order to make future incident response more effective. Lastly, you will explore the cyber-attack kill chain and the diamond model of intrusion analysis. This course can be used to prepare for the CS0-003: CompTIA Cybersecurity Analyst+ (CySA+) exam.
12 videos |
1h 9m
Assessment
Badge
CompTIA Cybersecurity Analyst+: OS Process Management
Managing the running processes on Linux and Windows hosts not only improves performance but also impacts how secure those hosts are. Determining what an abnormal performance or activity is greatly facilitates comparisons to current activity to established baselines of normal performance and behavior. In this course, I will start by navigating through the Windows registry followed by exploring Linux hardware devices using the Linux command line. I will then use the Windows Device Manager tool to manage a hardware device. Next, I will create partitions and file systems on Linux and Windows hosts followed by covering how processes and daemons interact with the Linux OS. I will manage Linux and Windows processes and daemons, or services. Lastly, I will establish a normal performance baseline on a Windows Server using a data collector set. This course can be used to prepare for the CS0-003: CompTIA Cybersecurity Analyst+ (CySA+) exam.
11 videos |
59m
Assessment
Badge
CompTIA Cybersecurity Analyst+: Authentication
Hardening authentication processes makes it more difficult for attackers to compromise accounts. Managing users and groups allows for access to required resources. In this course, you will explore authentication methods, including passwordless login. Then you will learn how to manage Linux users and groups using the command line and how to enable Secure Shell (SSH) public key authentication. Next, you will install and configure a Lightweight Directory Access Protocol (LDAP) server and client, manage Windows and cloud users and groups, and examine dynamic membership cloud-based groups. Finally, you will configure multi-factor authentication (MFA) for AWS users, manage Windows password policies, and discover identity federation. This course can be used to prepare for the CS0-003: CompTIA Cybersecurity Analyst+ (CySA+) exam.
13 videos |
1h 19m
Assessment
Badge
CompTIA Cybersecurity Analyst+: Authorization
Strong authorization settings limit permissions to resources for authenticated entities. Cybersecurity analysts must be aware of how to not only configure resource permissions, but also how to evaluate existing permissions to ensure adherence to the principle of least privilege. In this course, you will discover how authorization is related to, but differs from, authentication. Then you will explore access control models, such as role-based access control (RBAC) and attribute-based access control (ABAC). Next, you will find out how to manage Linux and Windows file system permissions using the command lines. Finally, you will learn how to configure Windows dynamic access control, work with privileged access management in Linux using sudo, and manage RBAC permissions in the Microsoft Azure cloud. This course can be used to prepare for the CS0-003: CompTIA Cybersecurity Analyst+ exam.
9 videos |
52m
Assessment
Badge
CompTIA Cybersecurity Analyst+: Cryptography
Confidentiality, integrity, and availability are core pillars of IT security governance. Cybersecurity analysts can harden IT environments using various encryption and hashing techniques. In this course, examine how the CIA triad relates to IT security and how cryptography protects sensitive data. Next, discover how to configure EFS file encryption and Microsoft BitLocker encryption, and use a customer-managed key to enable encryption for an Azure storage account. Finally, learn how to hash files in Linux and Windows, about hardware security modules (HSMs), and how TLS supersedes SSL. This course can be used to prepare for the CS0-003: CompTIA Cybersecurity Analyst+ exam.
12 videos |
1h 5m
Assessment
Badge
CompTIA Cybersecurity Analyst+: Public Key Infrastructure
Public key infrastructure (PKI) certificates are used to secure IT environments in many different ways, such as through e-mail encryption and web server HTTPS bindings. Technicians must have an understanding of how PKI certificates are requested, issued, and used. In this course, I'll start by discussing the PKI hierarchy from certification authorities (CAs) down to issued certificates and explore the PKI certificate life cycle. Next, I will deploy a private CA on the Windows platform and demonstrate how to manage PKI certificate templates. Then, I will acquire PKI certificates and configure a web server HTTPS binding. Lastly, I will configure a website to allow access only from clients with trusted PKI certificates. This course can be used to prepare for the CS0-003: CompTIA Cybersecurity Analyst+ exam.
9 videos |
49m
Assessment
Badge
CompTIA Cybersecurity Analyst+: Firewalls & Intrusion Detection
Firewall solutions control which types of network traffic are allowed into, through, or to leave a host or network. Cybersecurity analysts must know which type of firewall is needed for a given requirement as well as the placement of the firewall solution on the network. In this course, you will begin with a comparison of firewall types such as packet filtering, next-generation, and web application firewalls and learn how to determine their placement on the network. Then you will configure Windows Defender and Linux firewall settings. Next, you will configure Azure network security group firewall rules and explore the role played by forward and reverse proxy servers. Finally, you will install the Squid proxy server on Linux, find out how intrusion detection and prevention systems can address security concerns, and install and configure the Snort IDS. This course can be used to prepare for the CS0-003: CompTIA Cybersecurity Analyst+ exam.
10 videos |
56m
Assessment
Badge
CompTIA Cybersecurity Analyst+: Secure Coding & Digital Forensics
Security must be included in all phases of IT system and software development designs. Continuous integration and continuous delivery/deployment (CI/CD) integrates development and ongoing management of IT solutions. Cybersecurity analysts must understand IT governance and digital forensics concepts. Begin this course by examining the role of security in the software development life cycle (SDLC). Then you will explore CI/CD and learn how Git is used for file version control. Next, you will discover how the Control Objectives for Information and Related Technologies (COBIT) framework applies to IT governance and you will investigate digital forensics. Finally, you will configure legal hold settings for a cloud storage account and list common digital forensics hardware and software solutions. This course can be used to prepare for the CS0-003: CompTIA Cybersecurity Analyst+ exam.
10 videos |
55m
Assessment
Badge
CompTIA Data+: Understanding Databases
Databases are the backbone of modern life, powering everything from online shopping to social media to memberships and countless other activities. They enable us to store, manage, and retrieve vast amounts of information quickly and efficiently. Understanding databases is the very first step in mastering data analytics. In this course, you will explore databases, beginning with the basic concepts of data analytics, databases, including relational and non-relational databases, and common roles in the field of data science. Then you will examine structured query language (SQL) including examples of SQL operations. Finally, you will investigate the purpose of databases in applications, database management systems (DBMS), how databases are implemented in everyday business environments, and common database tasks. This course can be used to prepare for CompTIA Data+ (DA0-001) exam.
15 videos |
1h 40m
Assessment
Badge
CompTIA Data+: Database Concepts
Databases are used for creating and storing virtually any type of data. Data drives business in the twenty-first century, and IT professionals interested in mastering data analytics must understand the key concepts surrounding databases and their uses in almost every facet of business. In this course, you will discover database concepts, beginning with challenges associated with databases, self-driving databases, data warehouses, data marts, and data lakes and lakehouses. Then you will explore the concepts of Online Transactional Processing (OLTP) and Online Analytical Processing (OLAP). You will learn about database schemas and look closely at star and snowflake schemas, which are common in data warehouses. Finally, you will explore slowly changing dimensions that shape the methods analysts use to keep historical and current data. This course can be used to prepare for the DA0-001: CompTIA Data+ exam.
13 videos |
1h 14m
Assessment
Badge
CompTIA Network+: The OSI Reference Model
The Open Systems Interconnection (OSI) model is used to describe how computer systems communicate with each other. The OSI model is split into seven abstract layers and is often used for troubleshooting network problems. In this course, learn about the purpose and features of the OSI model. Next, examine each OSI model layer, including the application, presentation, session, transport, network, data link, and physical layers. Finally, discover how human-readable information, such as emails and chat messages, are transferred over a network, as well as the path this information takes along the OSI model. This course is one of a collection that helps prepare learners for the CompTIA Network+ (N10-009) certification exam.
10 videos |
51m
Assessment
Badge
CompTIA Network+: Networking Appliances, Applications, & Functions
Networking devices are hardware components used to facilitate communication and interaction between devices on a computer network. In this course, you'll learn about various networking devices to determine when and where to use them on a network. Explore common devices such as switches and routers, in addition to network appliances used for more specialized tasks such as the intrusion prevention system (IPS), intrusion detection system (IDS), proxy servers, and network-attached and storage area networks. Lastly, discover common networking functions including quality of service (QoS), virtual private network (VPN), and time to live (TTL). This course is one of a collection that helps prepare learners for the CompTIA Network+ (N10-009) certification exam.
11 videos |
59m
Assessment
Badge
CompTIA Network+: Cloud Computing Concepts
Cloud computing refers to the delivery of computing services, including servers, storage, databases, networking, software, and more over the Internet. This allows individuals and organizations to access and use these resources on demand, without needing to own or manage physical infrastructure. In this course, explore key cloud concepts and connectivity options, including network functions virtualization (NFV), virtual private cloud (VPC), network security groups, network security lists, and cloud gateways. Next, examine cloud connectivity options such as VPN and direct connection, and deployment and service models. Finally, learn about cloud scalability, elasticity, and multitenancy. This course is one of a collection that helps prepare learners for the CompTIA Network+ (N10-009) certification exam.
16 videos |
1h 26m
Assessment
Badge
CompTIA Network+: Network Topologies, Architectures, & Types
Network architectures refer to the overall design and layout of a network, including how devices and components are organized and interconnected. In this course, explore wireless and wired networking standards, the features of key satellite and cellular technologies, and the differences between various types of wired transmission media. Next, compare Ethernet and fibre channel (FC) transceiver protocols and the differences between common network connector types. Finally, learn about common network topologies, architectures, and types, as well as use cases for a collapsed core architecture and network traffic flow. This course is one of a collection that helps prepare learners for the CompTIA Network+ (N10-009) certification exam.
15 videos |
1h 14m
Assessment
Badge
CompTIA Network+: Disaster Recovery & High Availability Concepts
Disaster recovery and high availability are areas of security planning that involve tools, policies, and procedures that ensure the availability and recovery of critical services and infrastructure in the event of a human-induced or natural disaster. In this course, you'll explore high availability and disaster recovery concepts such as load balancing, multipathing, and network interface card teaming. You'll learn about facilities and infrastructure support concepts including uninterruptible power supply, power distribution units, generators, HVAC, and fire suppression. Lastly, you'll explore redundancy and high availability concepts including cold, warm, and hot sites, as well as network device backup and restore states and configurations. This course is one of a collection of courses that prepares learners for the N10-008: CompTIA Network+ certification exam.
9 videos |
59m
Assessment
Badge
CompTIA PenTest+: Attacks on Specialized Systems
Specialized systems by nature can be very challenging for penetration testers. They can use proprietary operating systems and file systems, and may require advanced reverse engineering and sandbox analysis. However, specialized systems are also very susceptible when it comes to weaknesses and vulnerabilities. In this course, you'll learn how to identify common attacks and vulnerabilities against specialized systems, including mobile systems and Internet of Things devices. You'll also explore common vulnerabilities, including data storage system vulnerabilities, management interface vulnerabilities, vulnerabilities related to virtual environments, and vulnerabilities related to containerized workloads. This course is one of a collection that helps prepare learners for the CompTIA PenTest+ (PT0-002) certification exam.
11 videos |
1h 14m
Assessment
Badge
CompTIA Security+: Implementing Cybersecurity Resilience
In order to protect your enterprise assets, you should be familiar with and know how to apply key cybersecurity resiliency concepts. In this course, you'll learn about redundancy concepts like geographic dispersal, RAID, and NIC teaming. You'll explore replication methods like storage area networking and virtual machines. You'll move on to examine various backup types, including full, incremental, differential, and snapshot. Next, you'll look at non-persistence and high availability concepts. Finally, you'll learn about the order of restoration and diversity concepts. This course can be used in preparation for the CompTIA Security+ SY0-601 certification exam.
9 videos |
32m
Assessment
Badge
CompTIA Security+: Wireless, Mobile, & Embedded Device Security
This domain encompasses one of the most rapidly changing and evolving sets of technologies. It also represents one of the most significant changes from the previous Security+ exam. In this CompTIA Security+ SY0-601 course, you'll explore a broad range of communication solutions based on the fundamental aspects of wireless, mobile, and embedded system technology security. You'll learn about a variety of specialized systems and concepts, including wireless cryptographic and authentication protocols, wireless security methods and installation, mobile connection methods and receivers, device types and deployment models, MDM and MAM, mobility enforcement and monitoring, and various embedded and specialized systems. By gaining knowledge in these areas, you will be prepared for a career in the world's most cutting-edge industries. This course can be used in preparation for the CompTIA Security+ SY0-601 certification exam.
14 videos |
54m
Assessment
Badge
CompTIA Server+: Deploying Cloud PaaS & SaaS
Platform as a Service (PaaS) and Software as a Service (SaaS) are two popular and valuable cloud service models. Both play a unique role in managing certain aspects of cloud computing. If you're an IT professional working in server environments, you need to know what these two cloud service models entail. Take this course to learn all about PaaS and SaaS solutions. Furthermore, practice deploying databases in the AWS and Microsoft Azure clouds. Configure a SaaS cloud solution. Use an automation template to deploy a PaaS solution. And use several strategies and tools to keep cloud computing costs to a minimum. Upon course completion, you'll be able to deploy PaaS and SaaS solutions and control cloud computing costs. This course also helps prepare you for the CompTIA Server+ SK0-005 certification exam.
9 videos |
46m
Assessment
Badge
CompTIA Server+: Network Communications
Learning the various aspects of network communications hardware and software is vital to anyone working in a server environment. Use this theory and practice-based course to get a grip on configuring virtual networks and virtual network interface cards (NICs). Explore how network communications hardware and software map to the OSI model. Identify different types of communication networks such as LAN and VLAN. Then, learn how network switching and network routing work. Moving on, practice deploying a hypervisor virtual network. Next, practice configuring IP routing in the cloud and virtual network peering. Then, identify various types of NICs and cables. And finally, practice configuring on-premises and cloud-based virtual machine NICs. Upon completion, you'll be able to identify various network models and configure virtual networks and virtual NICs. You'll also be a step closer to being prepared for the CompTIA Server+ SK0-005 certification exam.
12 videos |
1h 12m
Assessment
Badge
CompTIA Server+: Network Firewalls
In cybersecurity, firewalls control what type of traffic is allowed into or out of a server or network. There are a variety of firewall types designed for specific use-cases and these solutions can come in the form of a dedicated hardware or software appliance, or could be software running within a general purpose operating system. Discover common network and wireless security threats and mitigations, and how packet filtering firewalls work. Learn to configure a Windows and Linux firewall and work with cloud-based packet filtering in AWS and Microsoft Azure. Finally, discover how proxy servers and network address translation (NAT) work in securing the network. Upon completion, you'll be able to select and implement the appropriate firewall solution on-premises and in the cloud. This course is part of a collection that prepares you for the CompTIA Server+ SK0-005 certification exam.
14 videos |
1h 32m
Assessment
Badge
CompTIA Server+: Data Privacy & Protection
Data privacy has become engrained in laws and regulations all over the world. Server technicians must take the appropriate steps to secure sensitive data in alignment with applicable laws and regulations. Discover items that constitute personally identifiable information (PII) and protected health information (PHI) and identify common data security standards such as GDPR, HIPPAA, and PCI DSS. Differentiate between various types of malware and discover how the art of deception is practiced through social engineering. Next, examine data loss prevention (DLP) and implement data discovery and classification on-premises and in the cloud. Lastly, examine key storage media destruction techniques. Upon course completion, you'll be able secure data in alignment with applicable laws and regulations. You'll also be more prepared for the CompTIA Server+ SK0-005 certification exam.
11 videos |
1h 3m
Assessment
Badge
Forensic Analysis: Cybercrime Investigations
Cybercrime investigators are typically responsible for collecting, processing, analyzing, and interpreting digital evidence related to network vulnerabilities, criminal activity, and counterintelligence initiatives. In this course, you'll explore the basics of network packet capturing, a process used to intercept and log traffic occurring over a network. You'll also examine the purpose and features of some standard tools and techniques to preserve and analyze a computer system's most volatile data. You'll then learn to use some of these tools and techniques to achieve various digital forensic analysis goals. Next, you'll recognize computer forensic best practices, including locating evidence in the Windows Registry. Finally, you'll learn how to differentiate between the purpose and features of the various tools available for conducting hard disk forensic analysis.
17 videos |
1h 37m
Assessment
Badge
Enterprise Architecture: Architectural Principles & Patterns
In this 18-video course, learners can explore software architecture concepts, including the view model, consumer-driven contracts, architectural patterns, and architectural styles and solution patterns used to manage common machine learning issues. Begin by examining software architecture and the benefits it provides, and then the principles that should be followed when designing architecture for applications. You will discover the 4+1 view model and associated views, and learn to recognize software architectures, and the principles of developing enterprise architecture. Recall architectural principles for business, data, and technology, and the fundamental principles guiding service-oriented architecture (SOA) and use of the SOA maturity model. Next, explore serverless architecture; Backend-as-a-Service; the features of evolutionary architecture; and learn to recognize benefits of documenting architecture. Examine the structure of a software project team; the concept and characteristics of consumer-driven contracts; the dimensions of architecture that should be coupled to provide maximize benefit with minimal overheads and costs; and activities and tasks that software architects perform. Finally, take a look at architectural patterns and styles that can be adopted to eliminate common problems.
18 videos |
1h 34m
Assessment
Badge
Technical Program Management: Toolbox for the Program Manager
The technical program manager must possess a basic understanding of the concepts, tools, and techniques that would qualify their program as being technical. Technical capabilities also help the program manager to establish trust and credibility with stakeholders. In this course, you will discover systems architecture and key strategies and processes that support a DevOps culture. Then you will explore data management, networking solutions, and security principles and practices. Next, you will focus on cloud-based solutions, software development processes, and principles of user interface (UI) and user experience (UX). Finally, you will compare artificial intelligence to machine learning, learn about application programming interfaces (APIs), and investigate the importance of prioritizing domain knowledge. After completing this course, you will have a complete set of tools to run your technical programs efficiently and effectively.
13 videos |
1h 22m
Assessment
Badge
Security Program Regulatory Integration
In this 12-video course, learners will discover the importance of integrating regulations with organizational security policies. Explore security standards such as General Data Protection Regulation (GDPR); Health Insurance Portability and Accountability (HIPAA); and Federal Information Security Management Act (FISMA), as well as the International Organization for Standardization (ISO), and National Institute of Standard and Technology (NIST). To begin, determine how to establish the importance of building regulatory compliance into a company's IT security program. You will then examine Personally Identifiable Information (PII), and Protected Health Information (PHI). This leads into the subject of Payment Card Industry Data Security Standard (PCI DSS), and what it entails. You will learn how HIPAA protects medical information; how GDPR protects European Union citizen data, and how the Gramm-Leach-Bliley Act (GLBA), applies to financial institutions. You will also identify how FISMA strives to protect sensitive US Government information, and recognize both NIST and ISO security standards. To conclude the course, you will discover how the Sarbanes-Oxley Act (SOX), requires organizational financial transparency.
12 videos |
38m
Assessment
Badge
Cloud Security Administration: Infrastructure Planning
Cloud infrastructure consists of the physical location of the cloud data center. Depending on the data center location, there are different risks that are taken by the service provider and different methods used to tackle security issues. A secure cloud is created by using open source software and creating a technical support pool. Additionally, basic security concepts like protecting data in motion and in rest using encryption can be employed so that clients can only see their data. In this course, you'll learn about baselining cloud infrastructure, different components like hardware and software, and challenges faced in cloud environments.
13 videos |
55m
Assessment
Badge
Cloud Security Administration: Continuous Operational Improvement
"To manage, operate, and maintain the cloud environment, proper procedures have to be in place. In this course, you'll learn about design concepts and the various models that can be used for operational improvements. You'll then move to on learn about how to create a management plan, ITSM operation management, risk management, and stakeholder communication. "
11 videos |
1h 26m
Assessment
Badge
Ethical Hacker: Security Standards
Ethical hacking is not just random hacking attempts; it is a systematic testing of the target's security. For that reason, an understanding of security standards and formal testing methodologies is critical. Key concepts covered in this 11-video course include security standards such as NIST 800-115, a security standard which is integrally interconnected with ethical hacking and testing; and NIST 800-53, a security standard that can help users to professionalize and improve an ethical hacking test. Next, learn how to properly apply filtering and data validation; how to apply the NSA-IAM to ethical hacking to plan, execute, and report on your ethical hacking project; and how to apply the PTES to ethical hacking to plan, execute, and report on your ethical hacking project. Then learn about PCI-DSS standards and how to integrate them into ethical hacking; learn how to implement ISO 27001; and learn to interpret and apply NIST 800-12. Finally, learners observe how to employ NIST 800-26 standards to manage IT security; and learn about NIST 800-14 security protocols.
11 videos |
39m
Assessment
Badge
SecOps Engineer: Security Engineering
Explore fundaments of cybersecurity and engineering in this 10-video course, which examines the fundamental concepts of the CIA (confidentiality, integrity, and availability) triangle, and views security operations, security planning, engineering, application security through these three concepts. First, learners will examine the more advanced version: the McCumber Cube. You will learn to integrate systems engineering into cybersecurity, and explore requirements engineering, and how to gather requirements. Next, learn how to analyze them, to apply security requirements engineering techniques, and to finalize project requirements. You will be introduced to SecML (Security Modeling Language) which takes SysML (System Modeling Language) used by systems engineers, and to modify portions of it to be specific to cybersecurity. You will examine how SecML can be used to create both offensive and defensive security mitigation controls. This course examines security metrics, and how to apply engineering failure analysis methods to cybersecurity. Finally, you will observe how to incorporate security requirements engineering into cybersecurity, and the relevance of regulatory requirements.
10 videos |
33m
Assessment
Badge
Policy & Governance: Incident Response
Learners can explore the creation, adoption, and use of an IRP (Incident Response Plan) in this 14-video course, which examines the purpose and objectives of an IPR, and how it incorporates the objectives of an organization. You will learn how to draft an IRP, and examine the six stages of incident response: preparation, identification, containment, eradication, recovery, and lessons learned. Next, you will examine several tools that are available for incident response strategies, including Sleuth Kit, Metasploit, Websense, and FireEye Security Orchestrator. You will explore the different types of CSIRTs (Computer Security Incident Response Teams), team roles, their purpose, and the benefits of an outsourced team. This course demonstrates an incident team response with two hypothetical scenarios. You will learn about compliance and regulatory requirements, and will examine the international standard, ISO 27001. You will examine governance policy to direct and control IT security. Finally, you will learn to use governance polices to create incident response policies, and you will learn the elements and best practices for creating a plan.
14 videos |
1h 9m
Assessment
Badge
Describing Distributed Systems
Distributed systems involves numerous computers that work together but appear as only a single computer to the operator. In this course, you'll learn about distributed systems can provide numerous benefits including performance, availability, and autonomy. You'll also explore distributed systems in greater detail, and learn strategies and best practices for monitoring them.
13 videos |
42m
Assessment
Badge
CISM 2022: Managing Risk
Residual risk remains after security controls are put in place to mitigate the impact of threats. The organizational appetite for risk determines what level of residual risk is acceptable. In this course, you will explore how risk management improves business operations by minimizing the impact of realized threats. You will learn how to calculate the cost of mitigating risk compared to the value of the protected asset and determine the cost-benefit analysis and return on investment when implementing security controls. Next, discover the importance of risk assessments, especially where there are changes to some aspect of the business or a specific business process. You will then explore how various risk approaches, such as risk acceptance, avoidance, transfer, and reduction, apply to an organization's tolerance of residual risk. Lastly, discover how risk heat maps are an effective method for communicating various degrees of risk. This course can be used to prepare for the Certified Information Security Manager (CISM) exam.
9 videos |
49m
Assessment
Badge
EARN A DIGITAL BADGE WHEN YOU COMPLETE THESE TRACKS
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.YOU MIGHT ALSO LIKE
Rating 5.0 of 1 users
(1)