Defensible Security
IT Security
| Intermediate
- 14 Videos | 45m 56s
- Includes Assessment
- Earns a Badge
Explore defensible architecture and zero-trust models from the standpoint of a security architect. In this 14-video course, you will learn about tools used to address the challenges of network security and review common security models and standards for network security. Key concepts covered here include challenges and deficiencies of traditional security architectures; e standards that address the challenges of security architectures; and concepts and approaches to defensible architecture. Next, learners will examine some fundamentals for the zero-trust model for security; explore the security architecture needs for layers 1, 2, and 3; and delve into the principle of least privilege and how it pertains to security architecture. Learn about the security benefit of reproducible builds; learn how to configure a deny-first firewall using uncomplicated firewall (ufw); and learn how to configure a firewall to block all but a trust subnet. Finally, learners will observe how to configure a VPN service by using WireGuard; how to configure a secure VPN client to connect to a VPN server; and how to configure a firewall to block untrusted egress.
WHAT YOU WILL LEARN
-
discover the key concepts covered in this coursedescribe the challenges and deficiencies of traditional security architecturesdescribe some of the standards that address the challenges of security architecturesdescribe the concepts and approaches to defensible architecturedescribe the zero-trust model for securitydescribe the security architecture needs for layer 1, 2, and 3describe the principle of least privilege and how it pertains to security architecture
-
describe the security benefit of reproducible buildsconfigure a deny-first firewall using ufwconfigure a firewall to block all but a trust subnetconfigure a VPN service using WireGuardconfigure a secure VPN client to connect to a VPN serverconfigure a firewall to block untrusted egresssummarize the key concepts covered in this course
IN THIS COURSE
-
1.Course Overview1m 35sUP NEXT
-
2.Modernizing Security Architectures4m 12s
-
3.Security Architecture Standards3m 37s
-
4.Defensible Architecture3m 50s
-
5.Zero-trust Model3m 17s
-
6.Layered Security4m 26s
-
7.Principle of Least Privilege4m 22s
-
8.Reproducible Builds3m 35s
-
9.Uncomplicated Firewall2m 26s
-
10.Targeted Firewall Configuration2m 40s
-
11.WireGuard VPN Config4m 41s
-
12.VPN Security3m 16s
-
13.Egress Filtering2m 42s
-
14.Course Summary1m 17s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.