Overview/Description
Tying all the security mechanisms in your organization together is extremely important, as it will bring the overall security into effect. In this course, you'll learn about integrating hosts, storage, networks and applications into a secure enterprise architecture. You will also examine ways to integrate advanced authentication and authorization technologies to support enterprise objectives. This course is one of a series in the Skillsoft learning path that covers the objectives for the CompTIA Advanced Security Practitioner (CAS-002) certification exam.
Target Audience
Security candidates looking to certify their technical knowledge and skills required to conceptualize, engineer, integrate, and implement secure solutions across complex environments
CompTIA CASP CAS-002: Technical Integration of Enterprise Components
start the course
define how secure data flows can be used to meet changing business needs
define how standards are used to secure a network environment
define how interoperability issues affect network security
define how cloud and virtualized environments affect network security
define how the vulnerabilities associated with virtual machines will affect network security
define how to secure on-demand cloud computing
define how data aggregation and isolation is used to aid in securing a network environment
identify how provisioning and de-provisioning of resources affects network security
understand how to secure virtual environments
define how mergers, acquisitions, and divestitures can affect network security
define how network secure segmentation and delegation can affect network security
define how logical and physical deployment diagrams are used to create secure network environments
define how a secure infrastructure design is used when creating network security plans
define how storage integration can be used to aid in securing a network environment
define how CRM, ERP, and GRC are used to aid in creating a secure network environment
define how ESB, SOA, and directory services are used to aid in creating a secure network environment
define how DNS, CMDB, and CMS are used to aid in creating a secure network environment
identify how advanced authentication can help in creating a secure network environment
identify how advanced authorization is used to help create a secure network environment
define how attestation and identity propagation can help in creating a secure network environment
identify how federation can help in creating a secure network environment
identify how the RADIUS trust model can be used to help create a secure network environment
identify how the LDAP trust model can be used to help create a secure network environment
identify how the Active Directory trust model can be used to help create a secure network environment
to integrate hosts, storage, networks and applications into a secure enterprise architecture, and integrate advanced authentication and authorization technologies to support enterprise objectives