Course details

Security Architectures: Defensible Security

Security Architectures: Defensible Security


Overview/Description
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description

Explore defensible architecture and zero-trust models from the standpoint of a security architect. In this 14-video course, you will learn about tools used to address the challenges of network security and review common security models and standards for network security. Key concepts covered here include challenges and deficiencies of traditional security architectures; e standards that address the challenges of security architectures; and concepts and approaches to defensible architecture. Next, learners will examine some fundamentals for the zero-trust model for security; explore the security architecture needs for layers 1, 2, and 3; and delve into the principle of least privilege and how it pertains to security architecture. Learn about the security benefit of reproducible builds; learn how to configure a deny-first firewall using uncomplicated firewall (ufw); and learn how to configure a firewall to block all but a trust subnet. Finally, learners will observe how to configure a VPN service by using WireGuard; how to configure a secure VPN client to connect to a VPN server; and how to configure a firewall to block untrusted egress.



Expected Duration (hours)
0.8

Lesson Objectives

Security Architectures: Defensible Security

  • discover the key concepts covered in this course
  • describe the challenges and deficiencies of traditional security architectures
  • describe some of the standards that address the challenges of security architectures
  • describe the concepts and approaches to defensible architecture
  • describe the zero-trust model for security
  • describe the security architecture needs for layer 1, 2, and 3
  • describe the principle of least privilege and how it pertains to security architecture
  • describe the security benefit of reproducible builds
  • configure a deny-first firewall using ufw
  • configure a firewall to block all but a trust subnet
  • configure a VPN service using WireGuard
  • configure a secure VPN client to connect to a VPN server
  • configure a firewall to block untrusted egress
  • summarize the key concepts covered in this course
  • Course Number:
    it_saseardj_01_enus

    Expertise Level
    Intermediate