Technical Integration of Enterprise Security

  • by CertCop
  • Course level: Intermediate

Description

Program Objectives

  • Given a scenario, integrate hosts, storage, networks and applications into a secure enterprise architecture.
  • Given a scenario, integrate cloud and virtualization technologies into a secure enterprise architecture.
  • Given a scenario, integrate and troubleshoot advanced authentication and authorization technologies to support enterprise security objectives.
  • Given a scenario, implement cryptographic techniques.
  • Given a scenario, select the appropriate control to secure communications and collaboration solutions

Topics for this course

6 Lessons

Technical Integration of Enterprise Security?

Program Objectives Given a scenario, integrate hosts, storage, networks and applications into a secure enterprise architecture. Given a scenario, integrate cloud and virtualization technologies into a secure enterprise architecture. Given a scenario, integrate and troubleshoot advanced authentication and authorization technologies to support enterprise security objectives. Given a scenario, implement cryptographic techniques. Given a scenario, select the appropriate control to secure communications and collaboration solutions
Given a scenario, integrate hosts, storage, networks and applications into a secure enterprise architecture.00:45:00
Given a scenario, integrate cloud and virtualization technologies into a secure enterprise architecture.00:46:00
Given a scenario, integrate and troubleshoot advanced authentication and authorization technologies to support enterprise security objectives.00:36:00
Given a scenario, implement cryptographic techniques.00:53:00
Given a scenario, select the appropriate control to secure communications and collaboration solutions – Part 100:10:00
Given a scenario, select the appropriate control to secure communications and collaboration solutions – Part 200:18:00

About the instructors

0 (0 ratings)

299 Courses

228 students

$49