Security Architecture
Security Architecture Overview
Welcome to the Security Architecture course here at ACI Learning. In this course, you will learn about many different enterprise architectures and the security implications of those architectures. You will also learn about how you can apply security principles directly or indirectly to these enterprise architectures. This course also discusses various strategies you may use to protect your enterprise data. Finally, this course also explains the importance of resiliency and recovery in modern enterprise environments. Note that this course maps to the Security Architecture domain of the CompTIA Security+ SY0-701
examination.
0h 3m
WEBVTT
Greetings everyone and
welcome to this overview
episode of our series Security
Architecture. I will be your
host for this series. My name
is Daniel Lowry. Nice to meet
you. I have been in security
for a little while now, so this
is going to be a really fun
topic for me and my cohort here
to tackle. He's got a lot of
good information for you out
there. Let me introduce you to
him, shall we? This is one Mr.
Anthony Sequera. Anthony, could
you do
us a little bit of a favor
and tell us a bit about
yourself? You got it. So my
name is Anthony Sequera.
As you heard, I am CCIE number
15626. That's in the Cisco
space. I don't know why I
brought that up just now,
but hey, it's interesting about
my background that I am a Cisco
certified internet work expert.
And one of the things that we
have to deal with in that
certification is network
security. One of the things
that we'll certainly be
discussing. But it is great to
be teaching this with Daniel.
Daniel could teach this
himself. So you've got kind of
a dual power packed
set of hosts and SMEs for this.
Look at security architectures,
as Daniel said, and there's a
lot of them. There's a lot of
different enterprise
architectures and there's a lot
of security architectures that
we could apply to help
safeguard our organization.
So that's what we'll be
discussing. Well, man, you got
yourself a one, two punch right
here. That's right. Because we
do know this topic fairly well
and it will be like I said,
it's a lot of fun. We like
this. We're a little
bit passionate about it.
That said, Anthony, give us,
if you could, a couple of
things that we can expect from
this series. Yeah. A lot has
changed when it comes to
enterprises and their
architectures. I mean, cloud
now is hugely popular. So we're
going to be discussing things
like cloud, like
virtualization, some of the
latest buzzwords in our
industry. And no, we won't
mention chat GPT. I'll just get
it out of the way right now.
This is the one mention of chat
GPT. That's right. That's it.
It's the only time we'll say
it. It's the overview. But
yeah, there's a lot that has
changed. So it's going to be
really exciting for us to go
through and look at some of
these new technologies, make
sure you're fully up to speed
on them, and then most
importantly, discuss security
implications with them. Oh,
man, I am. I'm hot and
bothered. I'm ready for this
one. What are you most excited
about with this specific
course? I think I am most
excited for the cloud piece
just because I've been nerding
out on cloud thanks to Azure,
AWS, and Google Cloud Platform.
And I just think it's really
fascinating that we are moving
to the cloud at the pace that
we are.
And it's really interesting
to discuss security
implications. I'm going to have
to agree to agree with you on
that one. Good stuff there with
the cloud and the
virtualization. We love it.
It makes our lives easy.
So a lot of good stuff is going
to come out of what can we do
to secure that in this series.
So hopefully you find that
interesting and we will keep
you riveted to your chairs and
glued to your screens and learn
in that good security
information that you need in
this series. And we look
forward to seeing you there.
Overview
Welcome to the Security Architecture course here at ACI Learning. In this course, you will learn about many different enterprise architectures and the security implications of those architectures. You will also learn about how you can apply security principles directly or indirectly to these enterprise architectures. This course also discusses various strategies you may use to protect your enterprise data. Finally, this course also explains the importance of resiliency and recovery in modern enterprise environments. Note that this course maps to the Security Architecture domain of the CompTIA Security+ SY0-701
examination.
Learning Style
On Demand
Length of course
5h 2m
22 Episodes
Here are the topics we'll cover
- Course Overview
- Security Architecture Models
- Securing Enterprise Infrastructures
- Strategies to Protect Data
- Resilience in Security Architectures
Learning Options