Aspire Journeys

652 Security Architect KSAT Intermediate NCWF Journey

  • 74 Courses | 76h 39s
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Ensures that the stakeholder security requirements necessary to protect the organization's mission and business processes are adequately addressed in all aspects of enterprise architecture including reference models, segment and solution architectures, and the resulting systems supporting those missions and business processes.

652 Security Architect KSAT Intermediate

Ensures that the stakeholder security requirements necessary to protect the organization’s mission and business processes are adequately addressed in all aspects of enterprise architecture including reference models, segment and solution architectures, and the resulting systems supporting those missions and business processes.

  • 74 Courses | 76h 39s

COURSES INCLUDED

Configuring & Optimizing a System in Windows 11
Optimize your system's performance while keeping your Windows 11 system working at its best. During this course, you will explore optimization techniques using the Control Panel, Task Manager, and Windows settings. Change the way an application or Windows 11 element works by learning how to navigate and use the Control Panel. See how to activate or deactivate Windows 11 features. Learn how to check for problems and system performance levels with the Task Manager. Improve how long it takes your Windows 11 to start by managing your start-up applications. See how to free up and limit hard disk usage. Find out how to create, modify and delete tasks with the Task Scheduler. And finally, see how to configure your Wi-Fi connection settings to change your IP address and switch networks.
11 videos | 42m has Assessment available Badge
Artificial Intelligence: Human-computer Interaction Overview
In developing AI (artificial intelligence) applications, it is important to play close attention to human-computer interaction (HCI) and design each application for specific users. To make a machine intelligent, a developer uses multiple techniques from an AI toolbox; these tools are actually mathematical algorithms that can demonstrate intelligent behavior. The course examines the following categories of AI development: algorithms, machine learning, probabilistic modelling, neural networks, and reinforcement learning. There are two main types of AI tools available: statistical learning, in which large amount of data is used to make certain generalizations that can be applied to new data; and symbolic AI, in which an AI developer must create a model of the environment with which the AI agent interacts and set up the rules. Learn to identify potential AI users, the context of using the applications, and how to create user tasks and interface mock-ups.
14 videos | 55m has Assessment available Badge
Artificial Intelligence: Human-computer Interaction Methodologies
Human computer interaction (HCI) design is the starting point for an artificial intelligence (AI) program. Overall HCI design is a creative problem-solving process oriented to the goal of satisfying largest number of customers. In this course, you will cover multiple methodologies used in the HCI design process and explore prototyping and useful techniques for software development and maintenance. First, learn how the anthropomorphic approach to HCI focuses on keeping the interaction with computers similar to human interactions. The cognitive approach pays attention to the capacities of a human brain. Next, learn to use the empirical approach to HCI to quantitatively evaluate interaction and interface designs, and predictive modeling is used to optimize the screen space and make interaction with the software more intuitive. You will examine how to continually improve HCI designs, develop personas, and use case studies and conduct usability tests. Last, you will examine how to improve the program design continually for AI applications; develop personas; use case studies; and conduct usability tests.
14 videos | 56m has Assessment available Badge
AWS Solutions Architect Associate 2022: AWS Cryptography & PKI
Cryptography serves to protect data from tampering and from being exposed to unauthorized parties. AWS supports the creation and management of encryption keys and digital security certificates. In this course, discover how cryptography can provide data integrity and confidentiality. Then, examine the public key infrastructure (PKI) hierarchy and how certificates can be used to secure AWS services. Next, work with AWS Key Management Service (AWS KMS) to manage encryption keys and AWS Certificate Manager to create a private certificate authority (CA) and issue PKI certificates. Finally, practice renewing certificates, enabling HTTPS, and encrypting an EBS volume. This course can be used to prepare for exam SAA-C03, AWS Certified Solutions Architect - Associate.
13 videos | 1h 12m has Assessment available Badge
AWS Professional Solutions Architect 2020: Cryptography & PKI
This course will examine how cryptography and PKI (public key infrastructure) provide data confidentiality and security in the cloud to ensure that only authorized parties can view sensitive information and be confident of its source. PKI is a hierarchy of digital security certificates that are issued and managed by CAs (certificate authorities). You will learn how to use both PKIs and private CAs and how Amazon's KMS (Key Management Service) facilitates the use of keys. You will learn how to create a KMS key and how to enable EBS (Elastic Block Store) volume encryption. This course examines how KMS supports FIPS (Federal Information Processing Standard) 140-2, and is compliant with HSMs (hardware security modules). Finally, you will learn how to deploy a private CA to issue PKI certificates, request a public certificate and use a DNS (data name source) validation, and use a certificate to enable an application load balancer HTTPS (hypertext transfer protocol service) listener. This course can be used in preparation for the AWS Certified Solutions Architect-Professional SAP-C01 certification exam.
13 videos | 45m has Assessment available Badge
AWS SysOps Associate: AWS & Public Key Infrastructure
Cryptography is used to protect sensitive data. In your role as a certified AWS SysOps Admin, you'll come across a variety of ways in which you can use it. In this course, you'll explore standard cryptographic techniques and the AWS services to implement them. You'll begin by examining what cryptography and public key infrastructure (PKI) means. Next, you'll use the AWS Key Management Service (KMS) to create cryptographic keys and enable Amazon Elastic Block Store (EBS) volume encryption. You'll outline how to use hardware security modules in AWS. You'll then work with private and public certificates using AWS Certificate Manager. Lastly, you'll enable an HTTPS listener. This course is one of a collection that prepares learners for the AWS Certified SysOps Administrator - Associate (SOA-CO1) exam.
13 videos | 42m has Assessment available Badge
AWS SysOps Associate 2021: Cryptography
Cryptography is used to secure sensitive information through algorithms that can encrypt or scramble data to ensure data integrity and authentication (hashing algorithms). Delve deeper into cryptography and surrounding concepts through this course. Begin by learning more about symmetric and asymmetric encryption before moving on to Public Key Infrastructure (PKI). You'll then explore the PKI hierarchy and certificate contents along with the certificate lifecycle. Next, you'll discover how to work with AWS Certificate Manager to create a private CA and provision certificates. You'll wrap this course up by getting a closer look at the AWS Key Management Service (KMS). Once you're done with this course, you'll be able to secure resources in the AWS cloud using cryptography and PKI. Moreover, you'll also be closer to preparing for the AWS Certified SysOps Administrator - Associate exam, SOA-C02.
10 videos | 54m has Assessment available Badge
AWS SysOps Associate 2022: Key & Certificate Management
Using cryptographic solutions helps prevent data tampering and exposure of sensitive data to unauthorized parties, ensuring data confidentiality and integrity. AWS supports the creation and management of encryption keys and digital security certificates. In this course, discover how cryptography can provide data integrity and confidentiality. Then examine the public key infrastructure (PKI) hierarchy and how certificates can be used to secure AWS services. Next, work with AWS Key Management Service (AWS KMS) to manage encryption keys and AWS Certificate Manager to create a private certificate authority (CA) and issue PKI certificates. Finally, practice renewing certificates, enabling HTTPS, and encrypting an Elastic Block Store (EBS) volume. This course can be used to prepare for exam SOA-C02, AWS Certified SysOps Administrator - Associate.
13 videos | 1h 6m has Assessment available Badge
Microsoft Azure Security Technologies: Data Classification
This 17-video course explores how to organize and secure sensitive data by using data classification, as part of preparations for AZ-500 Microsoft Azure Security Technologies certification exam. First, learners will examine the PCI-DSS (Payment Card Industry Data Security Standard), and laws and regulations of the European Union GDPR (General Data Protection Regulation), and HIPAA (Health Insurance Portability and Accountability Act) to protect data. You will examine how to add tags to Microsoft Azure cloud resources in the Azure portal GUI (graphical user interface), and with PowerShell. Next, learn how DLP (data loss prevention) is used to control sensitive data. You will install AIP (Azure Information Protection) client, and learn to add labels to your data to organize it for security purposes. This course demonstrates how to use AIP in MS Word. You will learn to view protected data statistics. Finally, you will learn how to configure blob lifecycle settings, and blob container policies by using the portal.
17 videos | 53m has Assessment available Badge
CompTIA Cloud Essentials+: Cloud Design Considerations
Monitoring and benchmarking are essential when designing cloud that considers disaster recovery, high availability, and failover. In this course, you'll recognize the cloud design considerations that provide the highest possible availability, the levels of redundancy that ensure services continue in the case of a disaster, and the procedures that can be implemented for disaster recovery and business continuity. Moving on, you'll examine common deployment architectures to address availability and resiliency, the parameters and performance indices monitored at each cloud deployment level, and the goals of benchmarking. Next, you'll examine the different failover scenarios prevalent in cloud and the prominent use cases for placement groups and single and multiple availability zones. You'll configure EC2 Linux instances, install the Iperf network benchmark tool, and test TCP and UDP network performance. Lastly, you'll benchmark network throughput on an Amazon EC2 Windows instance and configure active-passive failover with multiple primary and secondary record resources. This course can be used in preparation for the CompTIA Cloud Essentials+ (CLO-002) certification exam.
14 videos | 1h has Assessment available Badge
CompTIA Cloud+: Cloud Solution Design
Developing new software systems can be costly and time consuming. Cloud-based solutions can help get your system online quickly and cost-effectively and help to meet all your business requirements. In this course, you'll learn how to analyze the cloud solution design in support of business requirements. First, you'll explore how to analyze the solution design while considering requirements for software, hardware, system integration, security, network, disaster recovery, budgeting, service level agreements, and compliance. Next, you'll learn about the benefits of using multiple environments for development, quality assurance, staging, and production. You'll also examine the advantages of performing blue-green deployments. Finally, you'll learn about software development testing techniques such as performance, regression, functional, usability, vulnerability, and penetration testing. This course is one of a collection of courses that prepares learners for the CompTIA Cloud+ (CV0-003) certification.
12 videos | 1h 13m has Assessment available Badge
CompTIA Cloud+: Cloud Identity & Access Management
Identity and access management is crucial to securing resources and ensuring the resources are used by the correct people. In this course, you'll learn about some of the security resources that are available for performing and enforcing identity and access management. First, you'll examine identity and access management, including user identification, authorization, and privileged access management. You'll learn how to use the Lightweight Directory Access Protocol to manage access to resources. Next, you'll explore how identity federation can be used to manage user identities and how certificate management can be performed using certificate authorities, registration authorities, certificate databases, certificate stores, and key archival servers. You'll then move on to learn about multi-factor authentication, single sign-on, Public Key Infrastructure, as well as secret and key management. Finally, you'll learn about the components that can be used to perform incident response preparation and incident response procedures such as evidence acquisition, chain of custody, and root cause analysis. This course is one of a collection of courses that prepares learners for the CompTIA Cloud+ (CV0-003) certification.
12 videos | 1h 13m has Assessment available Badge
CompTIA Cloud+: Cloud Security Controls
Ensuring the security of your operating systems and applications is a key component of keeping your cloud environment secure. There are several key steps that can be taken to ensure your cloud system is secure. In this course, you will learn about cloud security policies and managing cloud user permissions. Next, you will learn about anti-virus and anti-malware tools, firewalls, intrusion detection and intrusion prevention tools that can be used to detect and prevent cybersecurity attacks. Next, you will learn about hardening your cloud environment and using encryption to increase data security. Finally, you will learn about configuration management and how to monitor the system and event logs. This course is one of a collection of courses that prepares learners for the CompTIA Cloud+ (CV0-003) certification.
12 videos | 1h 9m has Assessment available Badge
CompTIA Cloud+: Cloud Troubleshooting Methodologies
Being able to troubleshoot cloud and network issues is important when trying to resolve failures or operational difficulties. In this course, you'll learn to use troubleshooting methodologies to resolve common cloud issues. First, you'll examine how to resolve cloud related issues using the troubleshooting methodology. Next, you'll explore how to resolve network security group misconfigurations issues and network connectivity issues. You'll then move on to learn about resolving network routing and firewall connectivity issues. You'll learn about the tools that you can use to troubleshoot and resolve network issues. Finally, you'll learn resource utilization, application performance, and load balancing performance tuning. This course is one of a collection of courses that prepares learners for the CompTIA Cloud+ (CV0-003) certification.
12 videos | 1h 22m has Assessment available Badge
CCSP 2022: Cloud Business Continuity Planning
When it comes to continuity of operations, the CCSP candidate must look at business continuity from the perspective of data center security management, as well as leveraging cloud managed services for continuity as a large customer. In this course, explore the main elements of business continuity planning (BCP). You will focus on the business impact analysis (BIA), including Recovery Time Objective (RTO), Recovery Point Objective (RPO), and recovery service levels. Then, you will examine different backup and restore policies and take a look at disaster recovery planning (DRP) and managed DRP cloud solutions. Finally, you will discover various disaster recovery plan testing strategies. This is one of a collection of courses that fully prepares the learner for the ISC2 Certified Cloud Security Professional (CCSP) 2022 exam.
7 videos | 34m has Assessment available Badge
Microsoft Azure Security Technologies: Managing Key Vault Secrets
Many Microsoft Azure services require credentials to access a variety of Azure resources. Azure Key Vault provides a secure centralized storage solution for these types of secrets. In this course, you will work with Azure key vaults. First, you will create a key vault and manage key vault secrets using the portal, the command line interface (CLI), and PowerShell. Next, you will work with public key infrastructure (PKI) certificates using the portal, the CLI and PowerShell. Lastly, you will review how hardware security modules (HSMs) work in Azure. This course can be used to prepare for exam AZ-500, Microsoft Azure Security Technologies.
10 videos | 48m has Assessment available Badge
Cloud Future: Adapting Cloud Innovation
The impact of future trends allow you to recognize how to build cloud-based applications and architectures that can adopt and adapt to emerging trends, technologies, and processes. In this course, you'll explore future trends in cloud computing and emerging technologies that can help with analyzing their impact on existing cloud operations and practices. You'll learn about solutioning strategies and resource types that can help with adopting emerging technologies and trending features in existing CloudOps architectures. Next, you'll examine cloud application design considerations and the inside-out and outside-in development strategies that can help with adopting and adapting to any futuristic upgrades. You'll learn about how to handle states at the service level, system architecture design considerations, and the use of Adapter pattern to build architectures that adopt and adapt to futuristic innovations. You'll examine the Minimum Valuable Increment design approach, the Manifesto for Future Generation Cloud Computing, and the manifesto areas that are relevant for aligning with the future research directions.
14 videos | 1h has Assessment available Badge
CRISC 2023: Cryptography
Confidentiality, integrity, and availability are core pillars of IT security governance. Cybersecurity analysts can harden IT environments using various encryption and hashing techniques. In this course, examine how the CIA triad relates to IT security and how cryptography protects sensitive data. Next, discover how to configure Encrypting File System (EFS) file encryption and Microsoft BitLocker encryption, and use a customer-managed key to enable encryption for an Azure storage account. Then learn how to hash files in Linux and Windows. Finally, find out about hardware security modules (HSMs) and the Trusted Platform Module (TPM), how Transport Layer Security (TLS) supersedes the Secure Sockets Layer (SSL), and how to enable HTTPS. This course can be used to prepare for the ISACA(r) Certified in Risk and Information Systems Control (CRISC(r)) certification.
14 videos | 1h 18m has Assessment available Badge
CRISC 2023: Network Security
Organizations should secure resource access while remaining compliant with relevant laws and regulations. One way to do this is to ensure proper network security controls are in place and reviewed regularly. In this course, learn about the OSI model layers, their relevance to network security controls, and the security aspects of network switching and network access control. Next, explore DHCP and DNS security issues, Wi-Fi authentication methods, and how to harden a DHCP and DNS deployment on Windows Server. Finally, discover the importance of honeypots and honeynets, how to implement a honeypot, how to analyze captured network traffic, and the purpose of an interconnection security agreement. This course can be used to prepare for the ISACA(r) Certified in Risk and Information Systems Control (CRISC(r)) certification.
15 videos | 1h 29m has Assessment available Badge
CompTIA Cybersecurity Analyst+: Network Security Concepts
Cybersecurity policies often require detailed network configuration changes and additions. Technicians must be proficient with the configuration and management of various TCP/IP protocols. In this course, I will start by discussing the Open Systems Interconnection (OSI) model, network switching, and network access control. Next, I'll discuss the TCP/IP protocol suite as well as IPv4 and IPv6 addressing. I will then discuss network routing, dynamic host configuration protocol (DHCP), domain name system (DNS) and Wi-Fi authentication methods. Lastly, I will cover virtual private networks (VPNs), IP Security (IPsec) and network time synchronization. This course can be used to prepare for the CS0-003: CompTIA Cybersecurity Analyst+ (CySA+) exam.
14 videos | 1h 29m has Assessment available Badge
CompTIA Cybersecurity Analyst+: Data Security Standards
To remain compliant with relevant data privacy laws and regulations, organizations must have a way of identifying sensitive data and implementing security controls to protect that data. In this course, explore how physical security is related to digital data security, examples of personally identifiable information (PII), and how data loss prevention (DLP) solutions can prevent data exfiltration. Next, learn about common data privacy regulations and standards, including GDPR, HIPAA, and PCI DSS. Finally, discover how to use Amazon Macie and File Server Resource Manager to discover and classify sensitive information and learn about the importance of service level objectives (SLOs) and service level agreements (SLAs). This course can be used to prepare for the CS0-003: CompTIA Cybersecurity Analyst+ (CySA+) exam.
11 videos | 1h 3m has Assessment available Badge
CompTIA Cybersecurity Analyst+: Threat Intelligence Information
Cybersecurity analysts and security tools can reference a variety of threat intelligence sources to keep up to date with the latest threats and mitigations. These can be used to help keep organization security policies as effective as possible. In this course, examine different threat intelligence sources, the common vulnerabilities and exposures (CVEs) website, and the MITRE ATT&CK knowledge base. Next, discover how the OWASP Top 10 can help harden vulnerable web applications, how advanced persistent threats (APTs) are executed, and common ISO/IEC standards. Finally, learn how to analyze CIS benchmark documents, the Common Vulnerability Scoring System (CVSS), common organization security policy structures, and how organizational culture relates to IT security. This course can be used to prepare for the CS0-003: CompTIA Cybersecurity Analyst+ (CySA+) exam.
12 videos | 1h 9m has Assessment available Badge
CompTIA Cybersecurity Analyst+: OS Process Management
Managing the running processes on Linux and Windows hosts not only improves performance but also impacts how secure those hosts are. Determining what an abnormal performance or activity is greatly facilitates comparisons to current activity to established baselines of normal performance and behavior. In this course, I will start by navigating through the Windows registry followed by exploring Linux hardware devices using the Linux command line. I will then use the Windows Device Manager tool to manage a hardware device. Next, I will create partitions and file systems on Linux and Windows hosts followed by covering how processes and daemons interact with the Linux OS. I will manage Linux and Windows processes and daemons, or services. Lastly, I will establish a normal performance baseline on a Windows Server using a data collector set. This course can be used to prepare for the CS0-003: CompTIA Cybersecurity Analyst+ (CySA+) exam.
11 videos | 59m has Assessment available Badge
CompTIA Cybersecurity Analyst+: Authentication
Hardening authentication processes makes it more difficult for attackers to compromise accounts. Managing users and groups allows for access to required resources. In this course, you will explore authentication methods, including passwordless login. Then you will learn how to manage Linux users and groups using the command line and how to enable Secure Shell (SSH) public key authentication. Next, you will install and configure a Lightweight Directory Access Protocol (LDAP) server and client, manage Windows and cloud users and groups, and examine dynamic membership cloud-based groups. Finally, you will configure multi-factor authentication (MFA) for AWS users, manage Windows password policies, and discover identity federation. This course can be used to prepare for the CS0-003: CompTIA Cybersecurity Analyst+ (CySA+) exam.
13 videos | 1h 19m has Assessment available Badge
CompTIA Cybersecurity Analyst+: Authorization
Strong authorization settings limit permissions to resources for authenticated entities. Cybersecurity analysts must be aware of how to not only configure resource permissions, but also how to evaluate existing permissions to ensure adherence to the principle of least privilege. In this course, you will discover how authorization is related to, but differs from, authentication. Then you will explore access control models, such as role-based access control (RBAC) and attribute-based access control (ABAC). Next, you will find out how to manage Linux and Windows file system permissions using the command lines. Finally, you will learn how to configure Windows dynamic access control, work with privileged access management in Linux using sudo, and manage RBAC permissions in the Microsoft Azure cloud. This course can be used to prepare for the CS0-003: CompTIA Cybersecurity Analyst+ exam.
9 videos | 52m has Assessment available Badge
CompTIA Cybersecurity Analyst+: Cryptography
Confidentiality, integrity, and availability are core pillars of IT security governance. Cybersecurity analysts can harden IT environments using various encryption and hashing techniques. In this course, examine how the CIA triad relates to IT security and how cryptography protects sensitive data. Next, discover how to configure EFS file encryption and Microsoft BitLocker encryption, and use a customer-managed key to enable encryption for an Azure storage account. Finally, learn how to hash files in Linux and Windows, about hardware security modules (HSMs), and how TLS supersedes SSL. This course can be used to prepare for the CS0-003: CompTIA Cybersecurity Analyst+ exam.
12 videos | 1h 5m has Assessment available Badge
CompTIA Cybersecurity Analyst+: Firewalls & Intrusion Detection
Firewall solutions control which types of network traffic are allowed into, through, or to leave a host or network. Cybersecurity analysts must know which type of firewall is needed for a given requirement as well as the placement of the firewall solution on the network. In this course, you will begin with a comparison of firewall types such as packet filtering, next-generation, and web application firewalls and learn how to determine their placement on the network. Then you will configure Windows Defender and Linux firewall settings. Next, you will configure Azure network security group firewall rules and explore the role played by forward and reverse proxy servers. Finally, you will install the Squid proxy server on Linux, find out how intrusion detection and prevention systems can address security concerns, and install and configure the Snort IDS. This course can be used to prepare for the CS0-003: CompTIA Cybersecurity Analyst+ exam.
10 videos | 56m has Assessment available Badge
CompTIA Cybersecurity Analyst+: Vulnerability & Penetration Testing
Vulnerability scanning identifies host and network vulnerabilities and must be an ongoing task. Penetration testing is an active security method by which there is an attempt to exploit discovered vulnerabilities. In this course, you will discover how to plan for, schedule, and execute vulnerability assessments, identify common vulnerability scanning tools, and conduct an nmap scan. Next, you will use Nessus and Zenmap to execute security scans and text web app security using the OWASP Zed Attack Proxy (ZAP) tool. Then you will explore penetration testing and the Metasploit framework and use the Burp Suite tool as an HTTP intermediary proxy. Finally, you will learn how to manage Azure policy, investigate potential indicators of compromise, and examine how IT security relates to industrial control systems. This course can be used to prepare for the CS0-003: CompTIA Cybersecurity Analyst+ exam.
14 videos | 1h 21m has Assessment available Badge
CompTIA Cybersecurity Analyst+: Secure Coding & Digital Forensics
Security must be included in all phases of IT system and software development designs. Continuous integration and continuous delivery/deployment (CI/CD) integrates development and ongoing management of IT solutions. Cybersecurity analysts must understand IT governance and digital forensics concepts. Begin this course by examining the role of security in the software development life cycle (SDLC). Then you will explore CI/CD and learn how Git is used for file version control. Next, you will discover how the Control Objectives for Information and Related Technologies (COBIT) framework applies to IT governance and you will investigate digital forensics. Finally, you will configure legal hold settings for a cloud storage account and list common digital forensics hardware and software solutions. This course can be used to prepare for the CS0-003: CompTIA Cybersecurity Analyst+ exam.
10 videos | 55m has Assessment available Badge
CompTIA Security+: Implementing Identity and Account Management & AAA Solutions
Identity and access management (IAM) is used to protect your data by ensuring the right users have access to the right resources. This CompTIA Security+ SY0-601 course covers various identity controls including identity providers, attributes, certifications, tokens, and SSH keys. It also discusses the use of different account types and common account policies, and authentication management techniques such as password keys, password vaults, TPM, HSM, and knowledge-based authentication. Finally, you learn about protocols and services used for federation and single sign-on, and access control schemes like ABAC, DAC, RBAC, and MAC. This course can be used in preparation for the CompTIA Security+ SY0-601 certification exam.
10 videos | 52m has Assessment available Badge
CompTIA Security+: Organizational Security Assessment Tools & Mitigation Controls
To prepare for the CompTIA Security+ SY0-601 certification exam, you will need to identify and describe popular organizational security assessment tools and risk mitigation controls. You will likely come across these tools at some point in your career, so prior knowledge of how these work and what they're used for will be highly beneficial. In this CompTIA Security+ SY0-601 course, you'll explore the concept of network reconnaissance and discovery, and examine packet capture and replay, file manipulation, and forensic tools. You'll also identify shell and script environments, exploitation kits, and password crackers. You'll move on to recognize methods for reconfiguring endpoint security solutions and describe configuration changes for mitigation, the concepts of isolation, containment, and segmentation, and secure orchestration, automation, and response (SOAR) solutions. This course can be used in preparation for the CompTIA Security+ SY0-601 certification exam.
12 videos | 43m has Assessment available Badge
CompTIA Server+: Network Firewalls
In cybersecurity, firewalls control what type of traffic is allowed into or out of a server or network. There are a variety of firewall types designed for specific use-cases and these solutions can come in the form of a dedicated hardware or software appliance, or could be software running within a general purpose operating system. Discover common network and wireless security threats and mitigations, and how packet filtering firewalls work. Learn to configure a Windows and Linux firewall and work with cloud-based packet filtering in AWS and Microsoft Azure. Finally, discover how proxy servers and network address translation (NAT) work in securing the network. Upon completion, you'll be able to select and implement the appropriate firewall solution on-premises and in the cloud. This course is part of a collection that prepares you for the CompTIA Server+ SK0-005 certification exam.
14 videos | 1h 32m has Assessment available Badge
Defensive CyberOps: Defensive Cyberspace Operations
A well-planned and properly executed DCO mission will enable the cyber warrior to repel attacks and rapidly prepare for offensive action. In this course, you'll learn the principles of Defensive Cyber Operations, including measures and responses. You'll explore cybersecurity and cyberspace operations in DCO. Next, you'll look at DCO analytics, missions, and operating domains. You'll explore the role of the mission owner and network owner in DCO, as well as planning considerations. Finally, you'll learn about cyberspace threats that may occur during the course of maneuver operations and common security and system tools used in DCO.
14 videos | 42m has Assessment available Badge
CloudOps Performance Tuning: Applying Performance Principles
When designing solutions, CloudOps practitioners need to mitigate typical performance issues. In this course, you'll explore some common performance problems and the systemic tuning approach to improving performance. You'll examine what comprises a performance engineering approach before outlining a practical performance tuning roadmap. Next, you'll identify post-deployment performance diagnostic techniques for large-scale software systems, essential steps when optimizing application performance, and functional and non-functional components and layers to consider when planning performance management. Moving on, you'll outline the steps involved in configuring performance testing and identify critical cloud computing KPIs and metrics. You'll investigate use cases that help identify gaps in hybrid and multi-cloud deployment architectures. You'll examine performance management challenges and recommended solution architecture for cloud-hosted services. Lastly, you'll outline how to measure private and hybrid cloud performance.
14 videos | 1h 13m has Assessment available Badge
Performance Engineering: Optimizing Performance in an Application
It is no longer adequate for software developers and engineers to simply write code that works. They also need to know how to optimize applications for best performance. Learn how you can do this in your role through this diverse course. Learn how software modeling can be employed when designing systems with performance in mind. Examine the role memory management plays in application performance. Discover techniques for code optimization and refactoring. Explore the benefits of optimizing code. And investigate the roles garbage collection, heap dumps, and threading management play in application performance. As you progress, study some code optimization best practices and write a multi-threaded program in .NET. Upon course completion, you'll know the best ways to optimize application performance.
12 videos | 1h 20m has Assessment available Badge
Authentication & Encryption: Best Practices
In this 14-video course, explore the authentication, authorization, and encryption options that a security architect will need on a day-to-day basis. The focus will be on two fronts-from a network security standpoint including cloud services, and internal solutions in an Agile and DevOps environment. Begin with a look at authentication, authorization, and encryption factors and how they fit together, then look at methods of authentication and best practices. This leads into methods of authorization and access control; the use of encryption methods and best practices in implementing encryption; and key symmetry-differentiating between public and private keys and their ciphers. Examine methods of keeping login and authentication credentials secure; view system authentication and authorization through user account administration in Linux, and handle security policy trade-offs in situations where solutions might not align with policy. Discover Secure Shell (SSH) configuration, and implementing and securing remote access to a system using SSH; create secure certificates and keys using OpenSSL; verify software package authenticity by using OpenSSL, and file encryption and file decryption with OpenSSL.
14 videos | 56m has Assessment available Badge
Mitigating Security Risks: Maintaining Business Continuity
Business continuity planning (BCP) ensures an organization functions smoothly during an unplanned incident or disaster. In this course, you'll explore what comprises BCP and how you can employ its methods before, during, and after a disaster. You'll learn about the importance of a business continuity plan and what's needed to create an effective one. You'll differentiate a business continuity plan from disaster recovery and emergency action plans. You'll then investigate some of the individual BCP steps in more detail, including the business impact analysis (BIA), risk management plan, and incident response plan phases. Moving on, you'll study what's involved in post-disaster recovery planning. Finally, you'll explore how to achieve business resiliency and excellence in the face of a disaster and during a pandemic, examining not only how to get back to normal but also how to exploit new opportunities and grow.
17 videos | 1h 36m has Assessment available Badge
Ethical Hacker: Secure Technology & Applications
Security devices and software are the technical aspect of security. An ethical hacker must be familiar with security technology in order to effectively conduct tests of the target organization's network. In this 10-video course, you will explore firewall types and usage, SIEM systems, intrusion detection systems and intrusion prevention systems (IDS/IPS), antivirus strategies, Windows Firewall, and how to implement Snort. Key concepts covered in this course include security devices and software concepts, and how they relate to ethical hacking; learning to correctly deploy firewall solutions, their relevance to ethical hacking, and different types and usage; and learning the role of SIEM (security information and event management) and how to deploy SIEM systems. Next, learners observe how to utilize IDS/IPS and its relationship to ethical hacking; learn antivirus concepts and implement an AV strategy; configure the firewall in Windows 10 and Windows Server 2019; and learn to configure Windows Defender. Conclude by learning how to implement basic Snort network IDS, a tool that can be used for simple packet capture or for IDS.
10 videos | 40m has Assessment available Badge
SecOps Engineer: System Infrastructure Security
This 13-video course explores SecOps (security and operations) engineering concepts. Learners will observe how security and operations are fused together, and learn to integrate system infrastructure security with normal business operations by applying engineering principles. Begin by learning the steps for infrastructure hardening of the operating system, including server workstations, routers, devices. You will examine server hardening, including how to turn off unneeded services, and remove unneeded software. Next, learn how to analyze and harden Windows 10, and to use security devices, and implement intrusion detection and prevention systems. You will examine the practical use of IDS (intrusion detection system) to detect activity that appears to be a possible intrusion, to log it, and to notify the administrator. You will then examine IPS (intrusion prevention system), which takes the additional step of shutting down the suspicious activity. Finally, you will explore firewall concepts, including stateless firewalls, how to use SPI (stateful packet inspection), and how to place them to improve your security network.
13 videos | 1h has Assessment available Badge
SecOps Engineer: Security Engineering
Explore fundaments of cybersecurity and engineering in this 10-video course, which examines the fundamental concepts of the CIA (confidentiality, integrity, and availability) triangle, and views security operations, security planning, engineering, application security through these three concepts. First, learners will examine the more advanced version: the McCumber Cube. You will learn to integrate systems engineering into cybersecurity, and explore requirements engineering, and how to gather requirements. Next, learn how to analyze them, to apply security requirements engineering techniques, and to finalize project requirements. You will be introduced to SecML (Security Modeling Language) which takes SysML (System Modeling Language) used by systems engineers, and to modify portions of it to be specific to cybersecurity. You will examine how SecML can be used to create both offensive and defensive security mitigation controls. This course examines security metrics, and how to apply engineering failure analysis methods to cybersecurity. Finally, you will observe how to incorporate security requirements engineering into cybersecurity, and the relevance of regulatory requirements.
10 videos | 33m has Assessment available Badge
CISM 2022: Information Security Governance
The best way to improve the enterprise security stance is to align IT security solutions with business objectives. In this course, you will consider how information security must align with business strategies. You will explore the business model for information security and review the importance of identifying and classifying assets critical to a business. Next, you will learn about supply chain security, personnel management, and the components of an information security program. You will discover the relationship between service-level agreements (SLAs) and organizational objectives and discuss the relevance of change and configuration management. Then, consider how to develop organizational security policies. Lastly, explore expense types, chain of custody, organizational culture, and how the Control Objectives for Information Technologies (COBIT) framework applies to IT governance. This course can be used to prepare for the Certified Information Security Manager (CISM) exam.
16 videos | 1h 40m has Assessment available Badge
CISM 2022: Security Standards
Global and local security standards, including laws and regulations, are an important input to determine how enterprises deploy and manage security controls. In this course, you will learn how the European Union's General Data Protection Regulation (GDPR) data privacy legislation applies to any organization world-wide handling private EU citizen data. Next, you will explore various International Organization for Standardization/International Electrotechnical Commission (ISO/IEC) standards for proper data governance, followed by American data privacy and cloud security standards such as Health Insurance Portability and Accountability Act (HIPAA) and Federal Risk and Authorization Management Program (FedRamp). Discover how to secure cardholder data as related to Payment Card Industry Data Security Standard (PCI DSS) international security standards and review other data privacy legislation including Canada's Personal Information Protection and Electronic Documents Act (PIPEDA) and China's Personal Information Protection Law (PIPL). Lastly, explore the importance of securing cloud service usage in alignment with the Cloud Controls Matrix (CCM). This course can be used to prepare for the Certified Information Security Manager (CISM) exam.
10 videos | 53m has Assessment available Badge
CISM 2022: Managing Risk
Residual risk remains after security controls are put in place to mitigate the impact of threats. The organizational appetite for risk determines what level of residual risk is acceptable. In this course, you will explore how risk management improves business operations by minimizing the impact of realized threats. You will learn how to calculate the cost of mitigating risk compared to the value of the protected asset and determine the cost-benefit analysis and return on investment when implementing security controls. Next, discover the importance of risk assessments, especially where there are changes to some aspect of the business or a specific business process. You will then explore how various risk approaches, such as risk acceptance, avoidance, transfer, and reduction, apply to an organization's tolerance of residual risk. Lastly, discover how risk heat maps are an effective method for communicating various degrees of risk. This course can be used to prepare for the Certified Information Security Manager (CISM) exam.
9 videos | 49m has Assessment available Badge
CISM 2022: Data Privacy
Enterprises must comply with relevant laws and regulations related to data privacy. This requires recognizing applicable laws and regulations and implementing the appropriate security controls. In this course, you will explore examples of personally identifiable information (PII) and protected health information (PHI) and learn about data residency implications related to the physical storage location of sensitive data. Next, learn how to reduce the possibility of data exfiltration through data loss protection policies and how to discover and classify data using Amazon Macie and Microsoft Purview governance. Then you will learn to configure data classification on the Microsoft Windows server platform and tag cloud resources for classification purposes. Lastly, explore how to configure Microsoft Azure storage account encryption using a customer-managed key. This course can be used to prepare for the Certified Information Security Manager (CISM) exam.
10 videos | 56m has Assessment available Badge
CISM 2022: Assessing Risk
Assessing risk is a crucial activity that enables organizations to evaluate risk exposure for business processes and assets. In this course, you will begin by exploring how to conduct vulnerability assessments and how the results can shed light on security control deficiencies. Next, you will learn how to perform a network vulnerability assessment and review the results, followed by scanning a web application for web app-specific vulnerabilities. You will discover how to conduct a gap analysis to determine the current security posture compared to a desired security posture. Then, you will explore the important aspects of when and how to run penetration tests. Lastly, you will see how to configure Microsoft Azure Policy assignments to determine cloud resource configuration compliance. This course can be used to prepare for the Certified Information Security Manager (CISM) exam.
8 videos | 45m has Assessment available Badge
CISM 2022: Common Network Security Threats
Some security controls are very specific to the threat that they address. Information security managers must be well versed in common network security threats in order to minimize the impact of realized threats on business processes. In this course, you will start by exploring various types of threat actors and their motivation for attacking networks. You will review industry standards related to categorizing threats, including common vulnerabilities and exposures (CVEs), the MITRE ATT&CK knowledge base, and the OWASP Top 10 web application security attacks. Next, you will learn how bug bounties are paid by companies to ensure the utmost in security for their products, which can influence customer choices. You will discover how various types of network attacks are executed including Wi-Fi attacks, SYN flood attacks, buffer overflow attacks, advanced persistent threats (APTs), and distributed denial-of-service (DDoS) attacks. Lastly, you will see how VPN anonymizer solutions and the Tor web browser can be used for anonymous network connectivity for legitimate as well as illegal purposes. This course can be used to prepare for the Certified Information Security Manager (CISM) exam.
13 videos | 1h 14m has Assessment available Badge
CISM 2022: Cloud Computing & Coding
The use of cloud services is a form of outsourcing of IT service which also introduces an element of risk. Software developers can use on-premises as well as cloud-based services to create, test, and deploy software solutions. In this course, you will explore cloud deployment models including public, private, hybrid, and community clouds. You will then cover cloud computing service models, such as Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS), including where the security responsibility lies in each model. Next, you will explore various cloud-based security controls addressing a wide variety of cloud computing security needs. You will discover how to deploy a repeatable compliant cloud-based sandbox environment using Microsoft Azure Blueprints. Next, explore how security must be included in each software development life cycle (SDLC) phase as opposed to post-implementation. Finally, discover the importance of secure coding practices and how security must integrate with software development, testing, deployment, and patching. This course can be used to prepare for the Certified Information Security Manager (CISM) exam.
9 videos | 49m has Assessment available Badge
CISM 2022: Data Protection with Cryptography
Cryptography provides solutions for ensuring data privacy and integrity. Various firmware and software solutions protect data in transit and data at rest. In this course, you will explore the CIA security triad and how it relates to the organization's security program. You will then review various cryptography solutions and discuss data integrity to assure that tampering has not occurred. Next, you will learn how Hardware Security Module (HSM) appliances and Trusted Platform Module (TPM) firmware provide cryptographic services. You will see how Transport Layer Security (TLS) supersedes the deprecated Secure Sockets Layer (SSL) network security protocol suite followed by discussing virtual private network (VPN) encrypted network tunnels, and the IP Security (IPsec) network security protocol suite. Lastly, you will explore the PKI hierarchy and how public key infrastructure (PKI) certificates are used for digital security throughout the certificate life cycle. This course can be used to prepare for the Certified Information Security Manager (CISM) exam.
12 videos | 1h 5m has Assessment available Badge
CISM 2022: Applied Cryptography
The periodic evaluation of the efficacy of cryptographic solutions is possible only with an understanding of how cryptography secures digital environments. In this course, you will explore data integrity by hashing files on the Linux and Windows platforms in an effort to detect unauthorized changes. You will configure a web application HTTPS binding to secure network communications to and from the web application. Then you will deploy a private certificate authority (CA), manage certificate templates, and deploy public key infrastructure (PKI) certificates. Next, you will configure a web application to require trusted client certificates. Finally, you will encrypt data at rest on Linux, on Windows with Encrypting File System (EFS), and Microsoft Bitlocker, and you will configure a cloud VPN connection and implement IPsec on Windows. This course can be used to prepare for the Certified Information Security Manager (CISM) exam.
14 videos | 1h 16m has Assessment available Badge
CISM 2022: Secure Device & OS Management
IT departments must work in conjunction with higher-level management to determine when and how to securely use technological solutions that support the business strategy. In this course, begin by exploring how mobile device usage in a business environment can introduce risk and how that risk can be managed with centralized remote wipe capabilities. Then find out how Microsoft Intune can be used to centrally manage devices and how to securely wipe a disk partition. Learn how to harden Windows computers using Group Policy and disable the deprecated SSL network security protocol on Windows hosts. Next, investigate common digital forensics hardware and software solutions, as well as the storage area network (SAN) security and jump box solutions to manage hosts securely and remotely. Finally, discover how to manage Azure resources permissions using managed identities, examine device and OS hardening techniques, and investigate the importance of firmware and software patching. This course can be used to prepare for the Certified Information Security Manager (CISM) exam.
16 videos | 1h 38m has Assessment available Badge
Secure Programmer: Encryption
In this 5-video course, learners discover the basics of cryptographic algorithms. You will receive a general overview of symmetric algorithms such as AES, Blowfish, and Serpent. You will also examine asymmetric algorithms such as RSA (Rivest, Sharmir, and Adelman), Diffie-Hellman, and elliptic-curve cryptography (ECC). More importantly, you will learn when to use which algorithm and what algorithms are better for specific purposes. You will then move on to integrity algorithms, including hashes like SHA (Secure Hash Algorithm 1), MD5 (Message Digest 5), and 6, RIPEMD (Ripe Message Digest), and HAVAL, as well as message authentication codes (MACs) and HMACs (keyed-hash message authentication codes). You will also examine the strengths and weaknesses of these different approaches. The goal is whether one can make intelligent choices about which algorithms to implement for which purpose; whether one's concerns are about confidentiality; if one needs to do key exchange; is message integrity an issue; are you storing passwords? These will each require different algorithms.
5 videos | 21m has Assessment available Badge
SSCP 2021: Basic Security Concepts
Most candidates for the (ISC)² Systems Security Certified Practitioner (SSCP) exam will have the required one year of paid job experience. So the basic security concepts are most likely a review for most learners. However, simply defining the technology is not enough. Candidates must be able to grasp how the following principles are implemented: (ISC)² Code of Ethics, confidentiality, integrity, availability, accountability, privacy, non-repudiation, least privilege, and segregation of duties (SoD). Take this course to explore how you would apply these principles to your own daily security operations. Upon completion, you'll have a solid knowledge of the topics covered in Domain 1: Security Operations and Administration of the (ISC)² SSCP 2021 CBK, preparing you to take the exam.
11 videos | 28m has Assessment available Badge
SSCP 2021: Understanding & Applying Cryptography
Although cryptography isn't covered until domain 5 of the SSCP CBK, potential exam candidates and security professionals will benefit from foundational knowledge of cryptosystems early in their training. Use this course to grasp the reasons and requirements for cryptography in safe-guarding information, including regulations and governance. Investigate cryptographic techniques, such as hashing and salting, symmetric and asymmetric encryption, and elliptic curve cryptography. Discover what's involves in digital signatures and certificates. Explore cryptographic attacks, cryptanalysis, and countermeasures. And delve into advanced cryptosystems, such as quantum computing and blockchain. Upon course completion, you'll be aware of the various traditional and modern cryptology techniques used to protect data and communications. This course will help you in the lead-up to taking the (ISC)² Systems Security Certified Practitioner (SSCP) 2021 exam.
10 videos | 41m has Assessment available Badge
SSCP 2021: Authentication & Trust Architectures
As a security professional, you'll likely have been exposed to the concept of origin authentication. However, in today's modern environment of mobile devices, the Internet of Things, and embedded systems, more robust authentication, authorization, and identity management methods are imperative. Use this course to comprehend how single and multi-factor authentication, single sign-on (SSO), device authentication, and federated access work. Examine the use of trust relationships between domains and what's meant by Zero Trust. And distinguish between various internetwork connections such as the Internet, intranets, and extranets. Upon course completion, you'll be able to detail how and why these authentication mechanisms and trust architectures are used. You'll also be one step closer to being prepared to take the (ISC)² Systems Security Certified Practitioner (SSCP) 2021 exam.
7 videos | 33m has Assessment available Badge
SSCP 2021: Business Continuity Planning
When dealing with security, preparation is key. A variety of disasters could happen to most organizations at any moment, and the impact that could have on data and systems could be detrimental. There are many measures and processes to help recover from a disaster. Use this course to learn a handful of them. Explore the main elements of business continuity planning (BCP), also called continuity of operations (COOP). See what's involved in business impact analysis and disaster recovery planning. And examine various backup and restore methods. Upon course completion, you'll know several strategies to ensure a business continues to function after a disaster. This course's objectives line up with those in Domain 4: Incident Response and Recovery of the SSCP CBK and will help you prepare for the (ISC)² Systems Security Certified Practitioner (SSCP) 2021 exam.
7 videos | 36m has Assessment available Badge
SSCP 2021: Fundamental Networking Concepts
Historically speaking, the vast majority of security practitioners, technicians, engineers, and architects come from the field of local and wide area networking. This factor, as well as the importance of protecting data-in-transit, makes networking a critical knowledge area. Use this course to get to grips with several networking concepts and methodologies. Learn to distinguish between the OSI and TCP/IP reference models. Explore network topologies, relationships, and media types. See what's meant by software-defined networking (SDN), Remote Authentication Dial-In User Service (RADIUS), and terminal access controller access-control system plus (TACACS+), among other terms. Examine commonly used ports and protocols. And look into remote access connectivity and virtual private networks (VPNs). Upon course completion, you'll be familiar with several fundamental networking concepts and network access control methodologies. You'll also be further prepared for the (ISC)² Systems Security Certified Practitioner (SSCP) 2021 exam.
9 videos | 50m has Assessment available Badge
Security Software Assessments
In this 13-video course, learners will discover techniques used to perform software security assessments and testing, including components of a security assessment, test strategy approaches, security control and software testing, and the security management process. Key concepts covered in this course include the major components of a security assessment and test strategies approaches; security control review methods including log and code reviews; and how to recognize security control testing mechanisms such as code testing. Next, learn the importance of a security management process and its common functions; learn steps to take to properly test software to ensure that it is secure; and learn methods to detect potential software vulnerabilities. Then learn common software vulnerabilities such as buffer overflow and injection flaws; learn how to avoid common software vulnerabilities by using secure coding techniques; and explore steps and techniques to analyze risk. Finally, learn about penetration testing and its purpose; and learn microservices, a mini-application that focuses on a specific task, and application programming interfaces (APIs) and highlight security concerns associated with each.
13 videos | 55m has Assessment available Badge
Threat Intelligence & Attribution Best Practices: Threat Intelligence Concepts
Identifying and interpreting threat intelligence is crucial to preventing and mitigating cyber attacks. In this course, you'll explore the various threat intelligence types and how they relate to an organization's threat landscape. You'll begin by examining the key characteristics and benefits of threat intelligence and how to use it before, during, and after an attack. You'll then name known cyber threat actors and common indicators of compromise. You'll characterize intelligence, data, and information, and the four categories of threat intelligence: strategic, tactical, operational, and technical. You'll outline the threat intelligence lifecycle and how machine learning and risk modeling relate to threat intelligence. Lastly, you'll recognize threat intelligence use cases and sources, and how to map the threat landscape and benefit from intrusion detection and analysis.
20 videos | 1h 38m has Assessment available Badge
CompTIA Cybersecurity Analyst+: Hardware & Security
Securing hardware includes applying firmware updates and configuring devices on isolated networks. In this course, you'll learn about mobile device security, IoT security, and vulnerable device lists. You'll explore physical security and the security risks presented by drones and vehicles. You'll move on to examine how SCADA is used for industrial device networks, how to recognize BIOS and UEFI security settings, how self encrypting drives can protect data at rest, and how hardware security modules are used for encryption offloading and cryptographic secret storage. This course can be used in preparation for the CompTIA Cybersecurity Analyst (CySA+) certification exam CS0-002.
11 videos | 39m has Assessment available Badge
Security Program Regulatory Integration
In this 12-video course, learners will discover the importance of integrating regulations with organizational security policies. Explore security standards such as General Data Protection Regulation (GDPR); Health Insurance Portability and Accountability (HIPAA); and Federal Information Security Management Act (FISMA), as well as the International Organization for Standardization (ISO), and National Institute of Standard and Technology (NIST). To begin, determine how to establish the importance of building regulatory compliance into a company's IT security program. You will then examine Personally Identifiable Information (PII), and Protected Health Information (PHI). This leads into the subject of Payment Card Industry Data Security Standard (PCI DSS), and what it entails. You will learn how HIPAA protects medical information; how GDPR protects European Union citizen data, and how the Gramm-Leach-Bliley Act (GLBA), applies to financial institutions. You will also identify how FISMA strives to protect sensitive US Government information, and recognize both NIST and ISO security standards. To conclude the course, you will discover how the Sarbanes-Oxley Act (SOX), requires organizational financial transparency.
12 videos | 38m has Assessment available Badge
Google Professional Cloud Architect: Designing for Google Cloud Compliance
Compliance is a significant concern for many organizations, and many have historically failed to protect data adequately. In this course you will explore how governance has come to protect data, such as health records, through legislation like HIPAA and COPPA. Then, discover how commercial interests have helped bolster financial stability by setting standards of protecting data via certifications like Personally Identifiable Information (PII) and Payment Card Industry Data Security Standard (PCI DSS) that allow customers and businesses to trust you. In addition, there are specific industry certifications that may need to be met depending on the function of the business you run, rather than the data you keep. You will also focus on the need to maintain careful auditing standards for the integrity of any legal disputes that might arise. Finally, you will focus on use cases that you can expect to encounter in an exam environment. This course is one of a collection that prepares learners for the Google Professional Cloud Architect exam.
12 videos | 59m has Assessment available Badge
CRISC 2023: Data Privacy
Data privacy is a foremost concern for most organizations. Compliance with laws and regulations feeds into risk management. In this course, you will discover the characteristics of Personally Identifiable Information (PII) and techniques to prevent sensitive data leakage. Then you will explore data loss prevention (DLP) and learn how to implement DLP using Microsoft Purview. Next, you will examine various data privacy and security standards including International Organization for Standardization (ISO)/International Electrotechnical Commission (IEC) standards, General Data Protection Regulation (GDPR), the Federal Risk and Authorization Management Program (FedRAMP) and the Health Insurance Portability and Accountability Act (HIPAA). Finally, you will focus on the Payment Card Industry Data Security Standard (PCI DSS), Canada's Personal Information Protection and Electronic Documents Act (PIPEDA) and China's Personal Information Protection Law (PIPL). This course can be used to prepare for the ISACA(r) Certified in Risk and Information Systems Control (CRISC(r)) certification.
12 videos | 1h 7m has Assessment available Badge
CRISC 2023: Data Classification
The need to comply with data privacy regulations and reduce risk to sensitive data applies to most organizations. Organizations must know which sensitive data they possess in order to secure it properly. In this course, I will begin by using tags, or metadata, to organize Microsoft Azure cloud resources. Next, I will use Amazon Macie to discover and classify data stored in Simple Storage Service (S3) buckets. I will then use Microsoft Purview governance to discover and classify data stored in storage accounts. I will also discover and classify data on the Windows Server platform using File Server Resource Manager (FSRM). Lastly, I will configure automated life cycle management for blobs in Microsoft Azure storage accounts. This course can be used to prepare for the ISACA(r) Certified in Risk and Information Systems Control (CRISC(r)) certification.
8 videos | 42m has Assessment available Badge
CompTIA Data+: Understanding Databases
Databases are the backbone of modern life, powering everything from online shopping to social media to memberships and countless other activities. They enable us to store, manage, and retrieve vast amounts of information quickly and efficiently. Understanding databases is the very first step in mastering data analytics. In this course, you will explore databases, beginning with the basic concepts of data analytics, databases, including relational and non-relational databases, and common roles in the field of data science. Then you will examine structured query language (SQL) including examples of SQL operations. Finally, you will investigate the purpose of databases in applications, database management systems (DBMS), how databases are implemented in everyday business environments, and common database tasks. This course can be used to prepare for CompTIA Data+ (DA0-001) exam.
15 videos | 1h 40m has Assessment available Badge
CompTIA Network+: The OSI Reference Model
The Open Systems Interconnection (OSI) model is used to describe how computer systems communicate with each other. The OSI model is split into seven abstract layers and is often used for troubleshooting network problems. In this course, learn about the purpose and features of the OSI model. Next, examine each OSI model layer, including the application, presentation, session, transport, network, data link, and physical layers. Finally, discover how human-readable information, such as emails and chat messages, are transferred over a network, as well as the path this information takes along the OSI model. This course is one of a collection that helps prepare learners for the CompTIA Network+ (N10-009) certification exam.
10 videos | 51m has Assessment available Badge
CompTIA Network+: Ports & Protocols
Understanding common networking protocols, ports, services, and traffic types is crucial for managing and securing networks. In this course, learn about the most commonly known protocols that are used today on computer networks, such as FTP, SMTP, DNS, HTTP/HTTPS, and more. Next, examine how HTTP enables computers to send and receive web-based communication messages and investigate other common key protocols and their ports. Finally, explore the Structured Query Language (SQL) programming language, common IP protocol types, and various traffic types. This course is one of a collection that helps prepare learners for the CompTIA Network+ (N10-009) certification exam.
21 videos | 2h 28m has Assessment available Badge
CompTIA Network+: Network Topologies, Architectures, & Types
Network architectures refer to the overall design and layout of a network, including how devices and components are organized and interconnected. In this course, explore wireless and wired networking standards, the features of key satellite and cellular technologies, and the differences between various types of wired transmission media. Next, compare Ethernet and fibre channel (FC) transceiver protocols and the differences between common network connector types. Finally, learn about common network topologies, architectures, and types, as well as use cases for a collapsed core architecture and network traffic flow. This course is one of a collection that helps prepare learners for the CompTIA Network+ (N10-009) certification exam.
15 videos | 1h 14m has Assessment available Badge
CompTIA Network+: Modern Network Environments
Network environments refer to the settings or contexts in which computer networks are deployed and operate. These environments can vary significantly based on their size, scope, purpose, and complexity. In this course, explore software-defined networks (SDN) and software-defined wide area networks (SD-WAN). Next, learn about Virtual eXtensible Local Area Network (VXLAN), zero trust architecture (ZTA), and secure access service edge (SASE) architecture. Finally, examine automation and source control aspects of Infrastructure as Code (IaC), compatibility requirements, and how to mitigate address exhaustion when working with IPv6. This course is one of a collection that helps prepare learners for the CompTIA Network+ (N10-009) certification exam.
9 videos | 47m has Assessment available Badge
CompTIA Network+: Network Monitoring & Disaster Recovery Concepts
Network monitoring is a critical aspect of managing and maintaining a computer network that involves the continuous observation and analysis of network infrastructure. Disaster recovery refers to the process and procedures an organization has in place to recover and restore its IT infrastructure and operations following a disaster. In this course, explore common network monitoring methods and solutions, including SNMP, port mirroring, traffic analysis and performance monitoring, and more. Next, learn about various important disaster recovery metrics, including RPO, RTO, MTTR, and MTBF. Finally, explore disaster recovery sites, high availability approaches, and key disaster recovery testing concepts. This course is one of a collection that helps prepare learners for the CompTIA Network+ (N10-009) certification exam.
43m has Assessment available Badge
CompTIA Network+: Troubleshooting Methodologies & Approaches
If an incident or outage occurs, network administrators must be able to respond effectively and resolve network problems promptly to avoid damages and costly repairs. A network troubleshooting methodology can provide guidance on using a systematic process of elimination when dealing with network issues. In this course, learn the best practices to use to identify a problem, establish a theory of probable cause, and test theories. Next, discover how to formulate a plan of action to resolve the problem, implement a solution, or escalate the issue. Finally, explore how to verify full system functionality and document findings, actions, outcomes, and lessons learned. This course is one of a collection that helps prepare learners for the CompTIA Network+ (N10-009) certification exam.
37m has Assessment available Badge
Enterprise Architecture: Design Architecture for Machine Learning Applications
Explore software architectures used to model machine learning (ML) applications in production, as well as the building blocks of ML reference architecture, in this 11-video course. Examine the pitfalls and building approaches for evolutionary architectures, Fitness function categories, architectural planning guidelines for ML projects, and how to set up complete ML solutions. Learners will begin by studying the basic architecture required to execute ML in enterprises, and will also take a look at software architecture and its features that can be used to model ML apps in production. Next, learn how to set up model ML apps; examine ML reference architecture and the associated building blocks; and view the approaches for building evolvable architectures and migration. Recognize the critical pitfalls of evolutionary architecture and antipatterns of technical architecture and change. Finally, observe how to set up complete ML solutions and explore the Fitness function and its associated categories. Conclude the course with an exercise on architectural planning guidelines for ML projects, with a focus on model refinement, testing, and evaluating production readiness.
11 videos | 59m has Assessment available Badge
Cloud Security Administration: Infrastructure Planning
Cloud infrastructure consists of the physical location of the cloud data center. Depending on the data center location, there are different risks that are taken by the service provider and different methods used to tackle security issues. A secure cloud is created by using open source software and creating a technical support pool. Additionally, basic security concepts like protecting data in motion and in rest using encryption can be employed so that clients can only see their data. In this course, you'll learn about baselining cloud infrastructure, different components like hardware and software, and challenges faced in cloud environments.
13 videos | 55m has Assessment available Badge
Cloud Security Administration: Continuous Operational Improvement
"To manage, operate, and maintain the cloud environment, proper procedures have to be in place. In this course, you'll learn about design concepts and the various models that can be used for operational improvements. You'll then move to on learn about how to create a management plan, ITSM operation management, risk management, and stakeholder communication. "
11 videos | 1h 26m has Assessment available Badge

EARN A DIGITAL BADGE WHEN YOU COMPLETE THESE TRACKS

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 5.0 of 2 users Rating 5.0 of 2 users (2)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)