Curriculum
- 1 Section
- 6 Lessons
- 10 Weeks
Expand all sectionsCollapse all sections
- Technical Integration of Enterprise Security6
- 1.1Given a scenario, integrate hosts, storage, networks and applications into a secure enterprise architecture.45 Minutes
- 1.2Given a scenario, integrate cloud and virtualization technologies into a secure enterprise architecture.46 Minutes
- 1.3Given a scenario, integrate and troubleshoot advanced authentication and authorization technologies to support enterprise security objectives.36 Minutes
- 1.4Given a scenario, implement cryptographic techniques.53 Minutes
- 1.5Given a scenario, select the appropriate control to secure communications and collaboration solutions – Part 218 Minutes
- 1.6Given a scenario, select the appropriate control to secure communications and collaboration solutions – Part 110 Minutes
Given a scenario, integrate cloud and virtualization technologies into a secure enterprise architecture.
Next