Technical Integration of Enterprise Security
Description
Program Objectives
- Given a scenario, integrate hosts, storage, networks and applications into a secure enterprise architecture.
- Given a scenario, integrate cloud and virtualization technologies into a secure enterprise architecture.
- Given a scenario, integrate and troubleshoot advanced authentication and authorization technologies to support enterprise security objectives.
- Given a scenario, implement cryptographic techniques.
- Given a scenario, select the appropriate control to secure communications and collaboration solutions
Topics for this course
6 Lessons
Technical Integration of Enterprise Security
Program Objectives
Given a scenario, integrate hosts, storage, networks and applications into a secure enterprise architecture.
Given a scenario, integrate cloud and virtualization technologies into a secure enterprise architecture.
Given a scenario, integrate and troubleshoot advanced authentication and authorization technologies to support enterprise security objectives.
Given a scenario, implement cryptographic techniques.
Given a scenario, select the appropriate control to secure communications and collaboration solutions