CompTIA Security+: Implementing Cybersecurity Resilience

CompTIA    |    Intermediate
  • 9 videos | 32m 20s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 174 users Rating 4.6 of 174 users (174)
In order to protect your enterprise assets, you should be familiar with and know how to apply key cybersecurity resiliency concepts. In this course, you'll learn about redundancy concepts like geographic dispersal, RAID, and NIC teaming. You'll explore replication methods like storage area networking and virtual machines. You'll move on to examine various backup types, including full, incremental, differential, and snapshot. Next, you'll look at non-persistence and high availability concepts. Finally, you'll learn about the order of restoration and diversity concepts. This course can be used in preparation for the CompTIA Security+ SY0-601 certification exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Describe various redundancy concepts like geographic dispersal, raid arrays, multipath, load balancers, and nic teaming
    Define common replication methods like storage area networking and virtual machines
    Recognize backup types including full, incremental, differential, and snapshot
    Describe non-persistence concepts as in revert to known state, last known good configuration, and live boot media
  • Define high availability concepts like redundancy and durability
    Describe order of restoration when dealing with continuity of operations and resiliency measures in the enterprise
    Recognize diversity concepts, which include technologies, vendors, crypto, and controls
    Discover the key concepts covered in this course

IN THIS COURSE

  • 1m 33s
  • 9m 31s
    After completing this video, you will be able to describe various redundancy concepts like geographic dispersal, RAID arrays, multipath, load balancers, and NIC teaming. FREE ACCESS
  • Locked
    3.  Replication Methods
    5m 34s
    In this video, find out how to define common replication methods like storage area networking (SAN) and virtual machines (VM). FREE ACCESS
  • Locked
    4.  Backup Types
    2m 38s
    After completing this video, you will be able to recognize backup types including full, incremental, differential, and snapshot. FREE ACCESS
  • Locked
    5.  Non-persistence Concepts
    3m 16s
    After completing this video, you will be able to describe non-persistence concepts such as Revert to Known State, Last Known Good Configuration, and live boot media. FREE ACCESS
  • Locked
    6.  High Availability Concepts
    2m 30s
    In this video, you will learn about high availability concepts like redundancy and durability. FREE ACCESS
  • Locked
    7.  Order of Restoration
    2m 53s
    Upon completion of this video, you will be able to describe the order of restoration when dealing with continuity of operations and resiliency measures in the enterprise. FREE ACCESS
  • Locked
    8.  Diversity Concepts
    3m 44s
    Upon completion of this video, you will be able to recognize diversity concepts, which include technologies, vendors, crypto, and controls. FREE ACCESS
  • Locked
    9.  Course Summary
    41s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 48 users Rating 4.6 of 48 users (48)
Rating 4.4 of 17 users Rating 4.4 of 17 users (17)
Rating 4.7 of 277 users Rating 4.7 of 277 users (277)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 483 users Rating 4.5 of 483 users (483)
Rating 4.4 of 234 users Rating 4.4 of 234 users (234)
Rating 4.4 of 114 users Rating 4.4 of 114 users (114)