Course details

Information Security: Hardened Security Topologies

Information Security: Hardened Security Topologies


Overview/Description
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description

In this 8-video course, learners will discover the key concepts of different security topologies and the key role they play in network security. Begin with an introduction to security topologies, which define the network design based on security requirements. You will then explore the design goals for security topology, the elements used to ensure that the information is secure, which means that you need the concepts of confidentiality, integrity, and availability (CIA), of information in a proper way, and it needs to be secured. You also need to practice accountability along with CIA concepts. Next, you will examine advantages and disadvantages of different security topologies, which are the Intranet, the Internet, and various other topologies. You will take a look at the impact of integrating cloud topologies, and also delve into the various layers of security in cloud computing. The final tutorial in this course explores the different methods used to harden the components of security topologies.



Expected Duration (hours)
0.7

Lesson Objectives

Information Security: Hardened Security Topologies

  • introduce the key concepts of the course
  • define security topologies
  • describe the elements used in designing goals of a security topology
  • list the advantages and disadvantages of different security topologies
  • describe the impact of integrating cloud topologies
  • list the various layers of security in cloud computing
  • name the different methods used to harden security topologies
  • summarize the key concepts covered in this course
  • Course Number:
    it_saseandj_05_enus

    Expertise Level
    Beginner