- Duration: 2 Hours
Course details
- Tying all the security mechanisms in your organization together is extremely important, as it will bring the overall security into effect. In this course, you'll learn about integrating hosts, storage, networks and applications into a secure enterprise architecture. You will also examine ways to integrate advanced authentication and authorization technologies to support enterprise objectives. This course is one of a series in the Skillsoft learning path that covers the objectives for the CompTIA Advanced Security Practitioner (CAS-002) certification exam.
- start the course
- define how secure data flows can be used to meet changing business needs
- define how standards are used to secure a network environment
- define how interoperability issues affect network security
- define how cloud and virtualized environments affect network security
- define how the vulnerabilities associated with virtual machines will affect network security
- define how to secure on-demand cloud computing
- define how data aggregation and isolation is used to aid in securing a network environment
- identify how provisioning and de-provisioning of resources affects network security
- understand how to secure virtual environments
- define how mergers, acquisitions, and pestitures can affect network security
- define how network secure segmentation and delegation can affect network security
- define how logical and physical deployment diagrams are used to create secure network environments
- define how a secure infrastructure design is used when creating network security plans
- define how storage integration can be used to aid in securing a network environment
- define how CRM, ERP, and GRC are used to aid in creating a secure network environment
- define how ESB, SOA, and directory services are used to aid in creating a secure network environment
- define how DNS, CMDB, and CMS are used to aid in creating a secure network environment
- identify how advanced authentication can help in creating a secure network environment
- identify how advanced authorization is used to help create a secure network environment
- define how attestation and identity propagation can help in creating a secure network environment
- identify how federation can help in creating a secure network environment
- identify how the RADIUS trust model can be used to
About New Horizons Lebanon
As changes in technology have accelerated, it’s become even more essential for people to master technology to be productive, invaluable employees who optimize, program and invent solutions—and even grow companies of their own. With over 300 centers in 60 countries, New Horizons is the world’s largest independent IT and Business training company. Over the past 35 years, New Horizons has delivered a full range of IT and business skills/Management training through innovative learning methods that have transformed businesses and helped over 35 million students reach their goals. New Horizons Lebanon branch was established in 1996.
- JavaScript Full stack web developer virtual internship Virtual Bootcamp + Internship at LaimoonAED 1,449Duration: Upto 30 Hours
- CompTIA Advanced Security Practitioner (CASP) John AcademyUSD 75
USD 1,580Duration: Upto 19 Hours - CompTIA Linux+ Certification John AcademyUSD 75
USD 1,580Duration: Upto 19 Hours