Defensible Security

IT Security    |    Intermediate
  • 14 videos | 45m 56s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 36 users Rating 4.6 of 36 users (36)
Explore defensible architecture and zero-trust models from the standpoint of a security architect. In this 14-video course, you will learn about tools used to address the challenges of network security and review common security models and standards for network security. Key concepts covered here include challenges and deficiencies of traditional security architectures; e standards that address the challenges of security architectures; and concepts and approaches to defensible architecture. Next, learners will examine some fundamentals for the zero-trust model for security; explore the security architecture needs for layers 1, 2, and 3; and delve into the principle of least privilege and how it pertains to security architecture. Learn about the security benefit of reproducible builds; learn how to configure a deny-first firewall using uncomplicated firewall (ufw); and learn how to configure a firewall to block all but a trust subnet. Finally, learners will observe how to configure a VPN service by using WireGuard; how to configure a secure VPN client to connect to a VPN server; and how to configure a firewall to block untrusted egress.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Describe the challenges and deficiencies of traditional security architectures
    Describe some of the standards that address the challenges of security architectures
    Describe the concepts and approaches to defensible architecture
    Describe the zero-trust model for security
    Describe the security architecture needs for layer 1, 2, and 3
    Describe the principle of least privilege and how it pertains to security architecture
  • Describe the security benefit of reproducible builds
    Configure a deny-first firewall using ufw
    Configure a firewall to block all but a trust subnet
    Configure a vpn service using wireguard
    Configure a secure vpn client to connect to a vpn server
    Configure a firewall to block untrusted egress
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 35s
  • 4m 12s
    Upon completion of this video, you will be able to describe the challenges and deficiencies of traditional security architectures. FREE ACCESS
  • Locked
    3.  Security Architecture Standards
    3m 37s
    After completing this video, you will be able to describe some of the standards that address the challenges of security architectures. FREE ACCESS
  • Locked
    4.  Defensible Architecture
    3m 50s
    Upon completion of this video, you will be able to describe the concepts and approaches to architecture that is defensible. FREE ACCESS
  • Locked
    5.  Zero-trust Model
    3m 17s
    Upon completion of this video, you will be able to describe the zero-trust security model. FREE ACCESS
  • Locked
    6.  Layered Security
    4m 26s
    After completing this video, you will be able to describe the security architecture needs for layers 1, 2, and 3. FREE ACCESS
  • Locked
    7.  Principle of Least Privilege
    4m 22s
    After completing this video, you will be able to describe the principle of least privilege and how it relates to security architecture. FREE ACCESS
  • Locked
    8.  Reproducible Builds
    3m 35s
    After completing this video, you will be able to describe the security benefits of reproducible builds. FREE ACCESS
  • Locked
    9.  Uncomplicated Firewall
    2m 26s
    In this video, you will configure a deny-first firewall using ufw. FREE ACCESS
  • Locked
    10.  Targeted Firewall Configuration
    2m 40s
    During this video, you will learn how to configure a firewall to block all but a trusted subnet. FREE ACCESS
  • Locked
    11.  WireGuard VPN Config
    4m 41s
    In this video, find out how to configure a VPN service using WireGuard. FREE ACCESS
  • Locked
    12.  VPN Security
    3m 16s
    Learn how to configure a secure VPN client to connect to a VPN server. FREE ACCESS
  • Locked
    13.  Egress Filtering
    2m 42s
    Learn how to configure a firewall to block untrusted traffic leaving the network. FREE ACCESS
  • Locked
    14.  Course Summary
    1m 17s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 80 users Rating 4.6 of 80 users (80)
Rating 4.4 of 17 users Rating 4.4 of 17 users (17)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 1991 users Rating 4.6 of 1991 users (1991)
Rating 4.6 of 59 users Rating 4.6 of 59 users (59)
Rating 4.5 of 356 users Rating 4.5 of 356 users (356)