Cargando…

CASP+ : preparing for security architecture domain.

Dean Bushmiller will give you the easiest, best path to learning the CompTIA CASP+ This certification qualifies you to assess cyber readiness within an enterprise. You will be able to design and implement the proper solutions to ensure the organization is ready for the next attack. You will have the...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Formato: Electrónico Video
Idioma:Inglés
Publicado: [Place of publication not identified] : Expanding Security, [2023]
Edición:[First edition].
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000ngm a22000007i 4500
001 OR_on1392081350
003 OCoLC
005 20231017213018.0
006 m o c
007 vz czazuu
007 cr cnannnuuuuu
008 230803s2023 xx 315 o vleng d
040 |a ORMDA  |b eng  |e rda  |e pn  |c ORMDA  |d OCLCO 
020 |a 9780996619189  |q (electronic video) 
020 |a 0996619186  |q (electronic video) 
029 1 |a AU@  |b 000075033659 
035 |a (OCoLC)1392081350 
037 |a 9780996619189  |b O'Reilly Media 
050 4 |a QA76.9.A25 
082 0 4 |a 005.8076  |2 23/eng/20230803 
049 |a UAMI 
245 0 0 |a CASP+ :  |b preparing for security architecture domain. 
246 3 |a CompTIA Advanced Security Practitioner plus :  |b preparing for security architecture domain 
246 3 0 |a Preparing for security architecture domain 
250 |a [First edition]. 
264 1 |a [Place of publication not identified] :  |b Expanding Security,  |c [2023] 
300 |a 1 online resource (1 video file (5 hr., 15 min.)) :  |b sound, color. 
306 |a 051500 
336 |a two-dimensional moving image  |b tdi  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
344 |a digital  |2 rdatr 
347 |a video file  |2 rdaft 
380 |a Instructional films  |2 lcgft 
511 0 |a Dean Bushmiller, presenter. 
520 |a Dean Bushmiller will give you the easiest, best path to learning the CompTIA CASP+ This certification qualifies you to assess cyber readiness within an enterprise. You will be able to design and implement the proper solutions to ensure the organization is ready for the next attack. You will have the knowledge and skills required to do the following: Architect, engineer, integrate, and implement secure solutions across complex environments to support a resilient enterprise This course in the CASP series covers the following topics: Architecture Analyze security requirements and objectives to ensure an appropriate, secure network architecture for a new or existing network Services Deperimeterization/zero trust Merging of networks from various organizations Software-defined networking Analyze organizational requirements to determine proper infrastructure security design Scalability Resiliency Automation Performance Containerization Virtualization Content delivery network Caching Integrate software applications securely into an enterprise architecture Baseline and templates Software assurance Considerations of integrating enterprise applications Integrating security into development life cycle Implement data security techniques for securing enterprise architecture Data loss prevention Data loss detection Data classification, labeling, and tagging Obfuscation Anonymization Encrypted versus unencrypted Data life cycle Data inventory and mapping Data integrity management Data storage, backup, and recovery Analyze security requirements and objectives to provide appropriate authentication and authorization controls Credential management Password policies Federation Access control Protocols Multifactor authentication One-time password Hardware root of trust Single sign-on JavaScript Object Notation web token Attestation and identity proofing Implement secure cloud and virtualization solutions Virtualization strategies Provisioning and deprovisioning Middleware Metadata and tags Deployment models and considerations Hosting models Service models Cloud provider limitations Extending appropriate on-premises controls Storage models Explain how cryptography and public key infrastructure support security objectives and requirements Privacy and confidentiality requirements Integrity requirements Non-repudiation Compliance and policy requirements Common cryptography use cases Common Public key infrastructure use cases Explain impact of emerging technologies on enterprise security and privacy Artificial intelligence Machine learning Quantum computing Blockchain Homomorphic encryption Secure multiparty computation Distributed consensus Big Data Virtual reality Three Dimetional printing Passwordless authentication Nano technology Deep learning Biometric impersonation. 
588 |a Online resource; title from title details screen (O'Reilly, viewed August 3, 2023). 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
610 2 0 |a Computing Technology Industry Association  |x Examinations  |v Study guides. 
650 0 |a Computer security  |x Examinations  |v Study guides. 
650 0 |a Computer networks  |x Security measures  |x Examinations  |v Study guides. 
650 6 |a Sécurité informatique  |x Examens  |v Guides de l'étudiant. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures  |x Examens  |v Guides de l'étudiant. 
655 7 |a Instructional films.  |2 lcgft 
655 7 |a Nonfiction films.  |2 lcgft 
655 7 |a Internet videos.  |2 lcgft 
655 7 |a Films de formation.  |2 rvmgf 
655 7 |a Films autres que de fiction.  |2 rvmgf 
655 7 |a Vidéos sur Internet.  |2 rvmgf 
700 1 |a Bushmiller, Dean,  |e presenter. 
710 2 |a Expanding Security (Firm),  |e publisher. 
856 4 0 |u https://learning.oreilly.com/videos/~/9780996619189/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP