Defensible Security

IT Security
  • 14 Videos | 51m 56s
  • Includes Assessment
  • Earns a Badge
Likes 9 Likes 9
Explore defensible architecture and zero-trust models from the standpoint of a security architect. In this 14-video course, you will learn about tools used to address the challenges of network security and review common security models and standards for network security. Key concepts covered here include challenges and deficiencies of traditional security architectures; e standards that address the challenges of security architectures; and concepts and approaches to defensible architecture. Next, learners will examine some fundamentals for the zero-trust model for security; explore the security architecture needs for layers 1, 2, and 3; and delve into the principle of least privilege and how it pertains to security architecture. Learn about the security benefit of reproducible builds; learn how to configure a deny-first firewall using uncomplicated firewall (ufw); and learn how to configure a firewall to block all but a trust subnet. Finally, learners will observe how to configure a VPN service by using WireGuard; how to configure a secure VPN client to connect to a VPN server; and how to configure a firewall to block untrusted egress.

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    describe the challenges and deficiencies of traditional security architectures
    describe some of the standards that address the challenges of security architectures
    describe the concepts and approaches to defensible architecture
    describe the zero-trust model for security
    describe the security architecture needs for layer 1, 2, and 3
    describe the principle of least privilege and how it pertains to security architecture
  • describe the security benefit of reproducible builds
    configure a deny-first firewall using ufw
    configure a firewall to block all but a trust subnet
    configure a VPN service using WireGuard
    configure a secure VPN client to connect to a VPN server
    configure a firewall to block untrusted egress
    summarize the key concepts covered in this course

IN THIS COURSE

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Likes 24 Likes 24  
Likes 51 Likes 51  

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE