Defensible Security
IT Security
| Intermediate
- 14 videos | 45m 56s
- Includes Assessment
- Earns a Badge
Explore defensible architecture and zero-trust models from the standpoint of a security architect. In this 14-video course, you will learn about tools used to address the challenges of network security and review common security models and standards for network security. Key concepts covered here include challenges and deficiencies of traditional security architectures; e standards that address the challenges of security architectures; and concepts and approaches to defensible architecture. Next, learners will examine some fundamentals for the zero-trust model for security; explore the security architecture needs for layers 1, 2, and 3; and delve into the principle of least privilege and how it pertains to security architecture. Learn about the security benefit of reproducible builds; learn how to configure a deny-first firewall using uncomplicated firewall (ufw); and learn how to configure a firewall to block all but a trust subnet. Finally, learners will observe how to configure a VPN service by using WireGuard; how to configure a secure VPN client to connect to a VPN server; and how to configure a firewall to block untrusted egress.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDescribe the challenges and deficiencies of traditional security architecturesDescribe some of the standards that address the challenges of security architecturesDescribe the concepts and approaches to defensible architectureDescribe the zero-trust model for securityDescribe the security architecture needs for layer 1, 2, and 3Describe the principle of least privilege and how it pertains to security architecture
-
Describe the security benefit of reproducible buildsConfigure a deny-first firewall using ufwConfigure a firewall to block all but a trust subnetConfigure a vpn service using wireguardConfigure a secure vpn client to connect to a vpn serverConfigure a firewall to block untrusted egressSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 35s
-
4m 12sUpon completion of this video, you will be able to describe the challenges and deficiencies of traditional security architectures. FREE ACCESS
-
3m 37sAfter completing this video, you will be able to describe some of the standards that address the challenges of security architectures. FREE ACCESS
-
3m 50sUpon completion of this video, you will be able to describe the concepts and approaches to architecture that is defensible. FREE ACCESS
-
3m 17sUpon completion of this video, you will be able to describe the zero-trust security model. FREE ACCESS
-
4m 26sAfter completing this video, you will be able to describe the security architecture needs for layers 1, 2, and 3. FREE ACCESS
-
4m 22sAfter completing this video, you will be able to describe the principle of least privilege and how it relates to security architecture. FREE ACCESS
-
3m 35sAfter completing this video, you will be able to describe the security benefits of reproducible builds. FREE ACCESS
-
2m 26sIn this video, you will configure a deny-first firewall using ufw. FREE ACCESS
-
2m 40sDuring this video, you will learn how to configure a firewall to block all but a trusted subnet. FREE ACCESS
-
4m 41sIn this video, find out how to configure a VPN service using WireGuard. FREE ACCESS
-
3m 16sLearn how to configure a secure VPN client to connect to a VPN server. FREE ACCESS
-
2m 42sLearn how to configure a firewall to block untrusted traffic leaving the network. FREE ACCESS
-
1m 17s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.YOU MIGHT ALSO LIKE
Audiobook
Cybersecurity All-in-One For Dummies