3.1 – Architecture Models

Cloud Infrastructures

Security in the cloud is a constant challenge. In this video, you’ll learn about infrastructure as code, serverless architectures, APIs, and more.

Network Infrastructure Concepts

Cloud-based network infrastructures can provide significant security features. In this video, you’ll learn about logical segmentation and how software defined networking can be securely deployed.

Other Infrastructure Concepts

New network services can introduce additional security concerns. In this video, you’ll learn about virtualization, containerization, Internet of things, embedded systems, and more.

Infrastructure Considerations

When designing a network, there are many different considerations. In this video, you’ll learn about resilience, cost, responsiveness, scalability, and more.

3.2 – Applying Security Principles

Secure Infrastructures

It’s important to place services where they can be easily secured. In this video, you’ll learn about security zones, attack surfaces, and connectivity.

Intrusion Prevention

Intrusion prevention can be a useful method of blocking attacks against known vulnerabilities. In this video, you’ll learn about IPS failure modes, device connections, and differences between active and passive monitoring.

Network Appliances

It can require many different network appliances to properly secure a network. In this video, you’ll learn about jump servers, application proxies, load balancing, sensors, collectors, and more.

Port Security

Securing network interfaces is another important security best practice. In this video, you’ll learn about EAP, IEEE 802.1X, and more.

Firewall Types

There are many different ways to secure network flows in real-time. In this video, you’ll learn about UTMs, NGFWs, and WAFs.

Secure Communication

Security also includes the packets flowing across the network. In this video, you’ll learn about different VPN technologies, features of SD-WANs, and SASE solutions.

3.3 – Protecting Data

Data Types and Classifications

There are many types of data that need to be secured. In this video, you’ll learn about different data types, data classifications, and classifying sensitive data.

States of Data

The state of data is an important security consideration. In this video, you’ll learn about data at rest, data in transit, data in use, and more.

Protecting Data

Protecting data can take many different forms. In this video, you’ll learn about geographic restrictions, encryption, hashing, obfuscation, tokenization, and more.

3.4 – Resiliency and Recovery

Resiliency

It can be challenging to maintain uptime and availability of our modern networks. In this video, you’ll learn about server clustering, load balancing, site resiliency, multi-cloud systems, and more.

Capacity Planning

It’s important to match the supply of network resources to the demand. In this video, you’ll learn how people, technology, and infrastructure should be evaluated to provide the proper capacity.

Recovery Testing

A disaster recovery plan isn’t very useful if it doesn’t work. In this video, you’ll learn how organizations test their recovery plans before an actual disaster occurs.

Backups 

Backups can be one of the best recovery methods when things go wrong. In this video, you’ll learn about backup frequency, encryption, snapshots, replication, and more.

Power Resiliency

Our computing systems rely on a stable power source. In this video, you’ll learn how UPS technologies and generators can be used to maintain power.