Program Objectives
- Given a scenario, integrate hosts, storage, networks and applications into a secure enterprise architecture.
- Given a scenario, integrate cloud and virtualization technologies into a secure enterprise architecture.
- Given a scenario, integrate and troubleshoot advanced authentication and authorization technologies to support enterprise security objectives.
- Given a scenario, implement cryptographic techniques.
- Given a scenario, select the appropriate control to secure communications and collaboration solutions
Course Features
- Lectures 6
- Quizzes 0
- Duration 10 weeks
- Skill level All levels
- Language English
- Students 282
- Certificate Yes
- Assessments Yes
Curriculum
- 1 Section
- 6 Lessons
- 10 Weeks
Expand all sectionsCollapse all sections
- Technical Integration of Enterprise Security6
- 1.1Given a scenario, integrate hosts, storage, networks and applications into a secure enterprise architecture.45 Minutes
- 1.2Given a scenario, integrate cloud and virtualization technologies into a secure enterprise architecture.46 Minutes
- 1.3Given a scenario, integrate and troubleshoot advanced authentication and authorization technologies to support enterprise security objectives.36 Minutes
- 1.4Given a scenario, implement cryptographic techniques.53 Minutes
- 1.5Given a scenario, select the appropriate control to secure communications and collaboration solutions – Part 218 Minutes
- 1.6Given a scenario, select the appropriate control to secure communications and collaboration solutions – Part 110 Minutes