CASP+ Cert Prep: 4 Technical Integration of Enterprise Security

Go to class
Write Review

Free Online Course: CASP+ Cert Prep: 4 Technical Integration of Enterprise Security provided by LinkedIn Learning is a comprehensive online course, which lasts for 2-3 hours worth of material. The course is taught in English and is free of charge. Upon completion of the course, you can receive an e-certificate from LinkedIn Learning. CASP+ Cert Prep: 4 Technical Integration of Enterprise Security is taught by Jason Dion.

Overview
  • Learn how to integrate various technologies into a secure enterprise architecture as you prepare for domain 4 of the CASP+ exam: Technical Integration of Enterprise Security.

Syllabus
  • Introduction

    • Getting ready for domain 4 of the CASP+ exam
    • What you should know
    • About the exam
    1. Integrating Hosts, Storage, Networks, and Applications into the Secure Enterprise Architecture
    • Adapting data flow security to changing business needs
    • Standards
    • Interoperability issues
    • Resiliency issues
    • Data security considerations
    • Provisioning and deprovisioning resources
    • Network segmentation and delegation
    • Design considerations for mergers and acquisitions
    • Logical deployment diagrams
    • Security and privacy considerations of storage integration
    • Security implications of enterprise applications
    2. Integrating the Cloud and Virtualization into the Secure Enterprise Architecture
    • Cloud considerations
    • Cloud service models
    • Virtualization security considerations
    • Augmenting security in the cloud
    • Commingling considerations
    • Data security considerations
    • Provisioning and deprovisioning resources
    3. Integrating Authentication and Authorization into the Secure Enterprise Architecture
    • Authentication
    • Authorization
    • Attestation
    • Identity proofing
    • Identity propagation
    • Federated identification
    • Trust models
    4. Integrating Cryptographic Techniques into the Secure Enterprise Architecture
    • Cryptographic techniques
    • Message authentication
    • Protection of data
    • Cryptographic implementations
    • Cryptographic implementation considerations
    • Stream versus block ciphers
    • Symmetric encryption
    • Asymmetric encryption
    • Public key infrastructure
    • Cryptocurrency and blockchain
    • Mobile device encryption considerations
    5. Integrating Secure Communications and Collaboration Solutions into the Secure Enterprise Architecture
    • Remote access
    • Unified communication
    • Web conferencing
    • Audio and video conferencing
    • Document and storage collaboration
    • Presence, instant messaging, and email
    • Telephony and VoIP integration
    • Cloud-based collaboration
    • Social media collaboration
    Conclusion
    • What next?