CompTIA CASP CAS-002: Technical Integration of Enterprise Components New Horizons Lebanon
Price: TBA
  • Duration: 2 Hours

Course details

  • Tying all the security mechanisms in your organization together is extremely important, as it will bring the overall security into effect. In this course, you'll learn about integrating hosts, storage, networks and applications into a secure enterprise architecture. You will also examine ways to integrate advanced authentication and authorization technologies to support enterprise objectives. This course is one of a series in the Skillsoft learning path that covers the objectives for the CompTIA Advanced Security Practitioner (CAS-002) certification exam.
  • start the course
  • define how secure data flows can be used to meet changing business needs
  • define how standards are used to secure a network environment
  • define how interoperability issues affect network security
  • define how cloud and virtualized environments affect network security
  • define how the vulnerabilities associated with virtual machines will affect network security
  • define how to secure on-demand cloud computing
  • define how data aggregation and isolation is used to aid in securing a network environment
  • identify how provisioning and de-provisioning of resources affects network security
  • understand how to secure virtual environments
  • define how mergers, acquisitions, and pestitures can affect network security
  • define how network secure segmentation and delegation can affect network security
  • define how logical and physical deployment diagrams are used to create secure network environments
  • define how a secure infrastructure design is used when creating network security plans
  • define how storage integration can be used to aid in securing a network environment
  • define how CRM, ERP, and GRC are used to aid in creating a secure network environment
  • define how ESB, SOA, and directory services are used to aid in creating a secure network environment
  • define how DNS, CMDB, and CMS are used to aid in creating a secure network environment
  • identify how advanced authentication can help in creating a secure network environment
  • identify how advanced authorization is used to help create a secure network environment
  • define how attestation and identity propagation can help in creating a secure network environment
  • identify how federation can help in creating a secure network environment
  • identify how the RADIUS trust model can be used to
Updated on 08 November, 2015

About New Horizons Lebanon

As changes in technology have accelerated, it’s become even more essential for people to master technology to be productive, invaluable employees who optimize, program and invent solutions—and even grow companies of their own. With over 300 centers in 60 countries, New Horizons is the world’s largest independent IT and Business training company. Over the past 35 years, New Horizons has delivered a full range of IT and business skills/Management training through innovative learning methods that have transformed businesses and helped over 35 million students reach their goals. New Horizons Lebanon branch was established in 1996.

See all New Horizons Lebanon courses
Courses you can instantly connect with... Do an online course on CompTIA starting now. See all courses

Is this the right course for you?

Rate this page

Didn't find what you were looking for ?

or