Information Security: Hardened Security Topologies
IT Security
| Beginner
- 8 Videos | 42m 36s
- Includes Assessment
- Earns a Badge
In this 8-video course, learners will discover the key concepts of different security topologies and the key role they play in network security. Begin with an introduction to security topologies, which define the network design based on security requirements. You will then explore the design goals for security topology, the elements used to ensure that the information is secure, which means that you need the concepts of confidentiality, integrity, and availability (CIA), of information in a proper way, and it needs to be secured. You also need to practice accountability along with CIA concepts. Next, you will examine advantages and disadvantages of different security topologies, which are the Intranet, the Internet, and various other topologies. You will take a look at the impact of integrating cloud topologies, and also delve into the various layers of security in cloud computing. The final tutorial in this course explores the different methods used to harden the components of security topologies.
WHAT YOU WILL LEARN
-
introduce the key concepts of the coursedefine security topologiesdescribe the elements used in designing goals of a security topologylist the advantages and disadvantages of different security topologies
-
describe the impact of integrating cloud topologieslist the various layers of security in cloud computingname the different methods used to harden security topologiessummarize the key concepts covered in this course
IN THIS COURSE
-
1.Course Overview1m 34sUP NEXT
-
2.Security Topologies Introduction2m
-
3.Designing Goals for Security Topology2m 7s
-
4.Advantages and Disadvantages of Security Topologies18m 37s
-
5.Impact of Integrating Cloud Topologies5m 36s
-
6.Layers of Security in Cloud Computing5m 54s
-
7.Methods to Harden Security Topologies6m 3s
-
8.Course Summary45s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.