The Enterprise Security Architecture |
|
The Basics of Enterprise Security |
|
01:00:00 |
|
The Enterprise Structure |
|
00:21:00 |
|
Enterprise Security Requirements |
|
00:09:00 |
The Enterprise Security Technology |
|
Common Network Security Components and Technologies |
|
00:55:00 |
|
Communications and Collaboration Security |
|
00:40:00 |
|
Cryptographic Tools and Techniques |
|
00:56:00 |
|
Advanced Authentication |
|
00:14:00 |
Enterprise Resource Technology |
|
Enterprise Storage Security Issues |
|
01:18:00 |
|
Distributed, Shared, and Virtualized Computing |
|
00:26:00 |
|
Cloud Computing and Security |
|
00:10:00 |
Security Design and Solutions |
|
Network Security Design |
|
02:22:00 |
|
Conduct a Security Assessment |
|
00:55:00 |
|
Host Security |
|
01:19:00 |
Managing Risk in Projects |
|
Create a Risk Management Plan |
|
01:15:00 |
|
Identify Risks and Their Causes |
|
00:11:00 |
|
Analyze Risks |
|
00:19:00 |
|
Develop a Risk Response Plan |
|
00:07:00 |
Integrating Advanced Authentication and Authorization Techniques |
|
Implement Authentication |
|
00:19:00 |
|
Implement Advanced |
|
00:07:00 |
Implementing Cryptographic Techniques |
|
Describe Cryptographic Concepts |
|
00:19:00 |
|
Choose Cryptographic Techniques |
|
00:31:00 |
|
Choose Cryptographic Implementation |
|
00:07:00 |
Integrating Hosts, Storage, Networks, and Apps in a Secure Enterprise Architecture |
|
Implement Security Standards in the Enterprise |
|
00:13:00 |
|
Select Technical Deployment Models |
|
00:28:00 |
|
The Enterprise Structure |
|
00:21:00 |
|
Secure Enterprise Application Integration Enablers |
|
00:21:00 |
Security Research and Analysis |
|
Perform an Industry Trends and Impact Analysis |
|
00:41:00 |
|
Perform an Enterprise Security Analysis |
|
00:26:00 |
Disaster Recovery and Business Continuity |
|
BCP Fundamentals |
|
00:21:00 |
|
BCP Implementation |
|
00:10:00 |
|
DRP Fundamentals |
|
00:18:00 |
|
DRP Implementation |
|
00:03:00 |
Responding to and Recovering from Incidents |
|
Design Systems to Facilitate Incident Response |
|
00:14:00 |
|
Conduct Incident and Emergency Responses |
|
00:20:00 |
Legal Issues |
|
Computer Crime Laws and Regulations |
|
00:16:00 |
|
Computer Crime Incident Response |
|
00:17:00 |
Judgment and Decision-Making |
|
Develop Critical Thinking Skills |
|
00:12:00 |
|
Determine the Root of a Problem |
|
00:06:00 |
|
Use Judgment to Make Sound Decisions |
|
00:18:00 |
Mock Exam |
Final Exam |