Integrating Hosts, Storage , & Applications in the Enterprise

Expert
  • 10 videos | 43m 17s
  • Includes Assessment
  • Earns a Badge
Rating 4.7 of 9 users Rating 4.7 of 9 users (9)
Explore how to integrate hosts, storage, networks, and applications into a secure enterprise. In this Computing Technology Industry Associate Advanced Security Practitioner course (CompTIA CASP+), you will see how to adapt a data flow security initiative to your organization; identify data flow security standards, interoperability issues, and resilience issues; review data security considerations; define resource provisioning and de-provisioning; consider merger and acquisition design; diagram and segment logical and physical networks; identify application integration security issues; and complete a review exercise.

WHAT YOU WILL LEARN

  • Adapt data flow security
    Describe data flow security standards
    Define interoperability issues
    Specify resilience issues
    Describe data security considerations
  • Define resource provisioning and de-provisioning
    Consider merger and acquisition design
    Diagram and segment the logical network
    Describe security issues with application integration
    Describe enterprise integration

IN THIS COURSE

  • 3m 20s
    In this video, you will learn how to adapt data security protocols. FREE ACCESS
  • 4m 33s
    Upon completion of this video, you will be able to describe data flow security standards. FREE ACCESS
  • Locked
    3.  Interoperability Issues
    4m 29s
    In this video, you will learn how to identify interoperability issues. FREE ACCESS
  • Locked
    4.  Resilience Issues
    5m 33s
    After completing this video, you will be able to identify resilience issues. FREE ACCESS
  • Locked
    5.  Data Security Considerations
    5m 31s
    After completing this video, you will be able to describe data security considerations. FREE ACCESS
  • Locked
    6.  Resource Provisioning and De-provisioning
    6m 55s
    In this video, find out how to define resource provisioning and deprovisioning. FREE ACCESS
  • Locked
    7.  Merger and Acquisition Design Considerations
    4m 5s
    In this video, you will learn how to design a merger or acquisition. FREE ACCESS
  • Locked
    8.  Logical Network Segmentation and Diagramming
    3m 8s
    Find out how to diagram and segment the network. FREE ACCESS
  • Locked
    9.  Security Issues with Application Integration
    3m 27s
    After completing this video, you will be able to describe security issues related to application integration. FREE ACCESS
  • Locked
    10.  Exercise: Describe Enterprise Integration
    2m 17s
    Upon completion of this video, you will be able to describe enterprise integration. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 23 users Rating 4.6 of 23 users (23)
Rating 4.4 of 5 users Rating 4.4 of 5 users (5)
Rating 4.6 of 30 users Rating 4.6 of 30 users (30)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.2 of 752 users Rating 4.2 of 752 users (752)
Rating 4.5 of 2861 users Rating 4.5 of 2861 users (2861)
Rating 4.3 of 45 users Rating 4.3 of 45 users (45)