There is a high demand for individuals with mastery-level cybersecurity skills now, and taking this CompTIA Advanced Security Practitioner course will ensure you can implement possible solutions in complicated settings.
Through the course, you will learn about the enterprise security architecture, following with security technology and resource technology. Apart from these, you will learn security design and solutions, application security design, managing risk, security policies, security procedures and enterprise security integration.
In addition to that, you will learn about security research and analysis, disaster recovery and business continuity, managing risk in projects, legal issues and judgment and decision-making.
By the time you complete the course, you will be able to provide the best cybersecurity solutions and protection for different organisations.
How is this qualification is delivered?
Our courses are taught entirely online, meaning you can access the materials wherever, whenever, at a pace that suits you, without formal deadlines or teaching schedules.
These can be accessed through any device with an internet connection. Our e-learning platform is optimised for use on mobile, tablet, laptops and desktop computers.
Certification:
Enhance your profile with a CPD-accredited certificate, available for an additional cost after course completion.
Course Curriculum
The Enterprise Security Architecture | |||
The Basics of Enterprise Security | FREE | 01:00:00 | |
The Enterprise Structure | 00:21:00 | ||
Enterprise Security Requirements | 00:09:00 | ||
The Enterprise Security Technology | |||
Common Network Security Components and Technologies | 00:55:00 | ||
Communications and Collaboration Security | 00:40:00 | ||
Cryptographic Tools and Techniques | 00:56:00 | ||
Advanced Authentication | 00:14:00 | ||
Enterprise Resource Technology | |||
Enterprise Storage Security Issues | 01:18:00 | ||
Distributed, Shared, and Virtualized Computing | 00:26:00 | ||
Cloud Computing and Security | 00:10:00 | ||
Security Design and Solutions | |||
Network Security Design | 02:22:00 | ||
Conduct a Security Assessment | 00:55:00 | ||
Host Security | 01:19:00 | ||
Managing Risk in Projects | |||
Create a Risk Management Plan | 01:15:00 | ||
Identify Risks and Their Causes | 00:11:00 | ||
Analyze Risks | 00:19:00 | ||
Develop a Risk Response Plan | 00:07:00 | ||
Integrating Advanced Authentication and Authorization Techniques | |||
Implement Authentication | 00:19:00 | ||
Implement Advanced | 00:07:00 | ||
Implementing Cryptographic Techniques | |||
Describe Cryptographic Concepts | 00:19:00 | ||
Choose Cryptographic Techniques | 00:31:00 | ||
Choose Cryptographic Implementation | 00:07:00 | ||
Integrating Hosts, Storage, Networks, and Apps in a Secure Enterprise Architecture | |||
Implement Security Standards in the Enterprise | 00:13:00 | ||
Select Technical Deployment Models | 00:28:00 | ||
The Enterprise Structure | 00:21:00 | ||
Secure Enterprise Application Integration Enablers | 00:21:00 | ||
Security Research and Analysis | |||
Perform an Industry Trends and Impact Analysis | 00:41:00 | ||
Perform an Enterprise Security Analysis | 00:26:00 | ||
Disaster Recovery and Business Continuity | |||
BCP Fundamentals | 00:21:00 | ||
BCP Implementation | 00:10:00 | ||
DRP Fundamentals | 00:18:00 | ||
DRP Implementation | 00:03:00 | ||
Responding to and Recovering from Incidents | |||
Design Systems to Facilitate Incident Response | 00:14:00 | ||
Conduct Incident and Emergency Responses | 00:20:00 | ||
Legal Issues | |||
Computer Crime Laws and Regulations | 00:16:00 | ||
Computer Crime Incident Response | 00:17:00 | ||
Judgment and Decision-Making | |||
Develop Critical Thinking Skills | 00:12:00 | ||
Determine the Root of a Problem | 00:06:00 | ||
Use Judgment to Make Sound Decisions | 00:18:00 |
Course Reviews
No Reviews found for this course.