Course Description
In this course, students will examine advanced security concepts, principles, and implementations that pertain to enterprise-level security.
This course is targeted toward an IT Professional that has the technical knowledge and skills required to conceptualize, design, and engineer secure solutions across complex enterprise environments. Students should have a minimum of 10 years of experience including at least 5 years of hands-on technical security experience.
Program Objectives
In this course, you will analyze and apply advanced security concepts, principles, and implementations that contribute to enterprise-level security.
You will:
- Support IT governance in the enterprise with an emphasis on managing risk.
- Leverage collaboration tools and technology to support enterprise security.
- Use research and analysis to secure the enterprise.
- Integrate advanced authentication and authorization techniques.
- Implement cryptographic techniques, security controls for hosts and mobile devices, network security, and security in the systems and software development lifecycle.
- Integrate hosts, storage, networks, applications, virtual environments, and cloud technologies in secure enterprise architecture.
- Conduct security assessments; responding to and recovering from security incidents.
Prerequisites
- CompTIA A+
- HS Diploma/GED
Exam Details
Number of Questions: 90 questions
Type of Questions: Multiple-choice and performance-based
Length of Test: 165 Minutes
Passing Score: 655 (on a scale of 100-900)
Recommended Experience
A minimum of ten years of general hands-on IT experience, with at least five years of broad hands-on security experience.
Course Features
- Lectures 26
- Quizzes 0
- Duration 19 hours
- Skill level All levels
- Language English
- Students 382
- Certificate Yes
- Assessments Yes
Curriculum
- 5 Sections
- 26 Lessons
- 10 Weeks
- 1.0 Risk Management4
- 1.1Summarize business and industry influences and associated security risks.22 Minutes
- 1.2Compare and contrast security, privacy policies and procedures based on organizational requirements.36 Minutes
- 1.3Given a scenario, execute risk mitigation strategies and controls.10 Minutes
- 1.4Analyze risk metric scenarios to secure the enterprise.28 Minutes
- 2.0 Enterprise Security Architecture8
- 2.1Analyze a scenario and integrate network and security components, concepts and architectures to meet security requirements Part-152 Minutes
- 2.2Analyze a scenario and integrate network and security components, concepts and architectures to meet security requirements Part-264 Minutes
- 2.3Analyze a scenario and integrate network and security components, concepts and architectures to meet security requirements Part-322 Minutes
- 2.4Analyze a scenario to integrate security controls for host devices to meet security requirements Part-153 Minutes
- 2.5Analyze a scenario to integrate security controls for host devices to meet security requirements Part-229 Minutes
- 2.6Analyze a scenario to integrate security controls for mobile and small form factor devices to meet security requirements Part-161 Minutes
- 2.7Analyze a scenario to integrate security controls for mobile and small form factor devices to meet security requirements Part-214 Minutes
- 2.8Given software vulnerability scenarios, select appropriate security controls.66 Minutes
- 3.0 Enterprise Security Operations5
- 3.1Given a scenario, conduct a security assessment using the appropriate methods.51 Minutes
- 3.2Analyze a scenario or output, and select the appropriate tool for a security assessment Part-162 Minutes
- 3.3Analyze a scenario or output, and select the appropriate tool for a security assessment Part-258 Minutes
- 3.4Given a scenario, implement incident response and recovery procedures Part-159 Minutes
- 3.5Given a scenario, implement incident response and recovery procedures Part-215 Minutes
- 4.0 Technical Integration of Enterprise Security6
- 4.1Given a scenario, integrate hosts, storage, networks and applications into a secure enterprise architecture.45 Minutes
- 4.2Given a scenario, integrate cloud and virtualization technologies into a secure enterprise architecture.46 Minutes
- 4.3Given a scenario, integrate and troubleshoot advanced authentication and authorization technologies to support enterprise security objectives.36 Minutes
- 4.4Given a scenario, implement cryptographic techniques.53 Minutes
- 4.5Given a scenario, select the appropriate control to secure communications and collaboration solutions – Part 218 Minutes
- 4.6Given a scenario, select the appropriate control to secure communications and collaboration solutions – Part 110 Minutes
- 5.0 Research, Development and Collaboration3
- 5.1Given a scenario, apply research methods to determine industry trends and their impact to the enterprise.35 Minutes
- 5.2Given a scenario, implement security activities across the technology life cycle.58 Minutes
- 5.3Explain the importance of interaction across diverse business units to achieve security goals.19 Minutes