Security Architecture

Overview

Welcome to the Security Architecture course here at ACI Learning. In this course, you will learn about many different enterprise architectures and the security implications of those architectures. You will also learn about how you can apply security principles directly or indirectly to these enterprise architectures. This course also discusses various strategies you may use to protect your enterprise data. Finally, this course also explains the importance of resiliency and recovery in modern enterprise environments. Note that this course maps to the Security Architecture domain of the CompTIA Security+ SY0-701 examination.
Security Architecture Overview
Welcome to the Security Architecture course here at ACI Learning. In this course, you will learn about many different enterprise architectures and the security implications of those architectures. You will also learn about how you can apply security principles directly or indirectly to these enterprise architectures. This course also discusses various strategies you may use to protect your enterprise data. Finally, this course also explains the importance of resiliency and recovery in modern enterprise environments. Note that this course maps to the Security Architecture domain of the CompTIA Security+ SY0-701 examination.
Clock icon0h 3m
WEBVTT Greetings everyone and welcome to this overview episode of our series Security Architecture. I will be your host for this series. My name is Daniel Lowry. Nice to meet you. I have been in security for a little while now, so this is going to be a really fun topic for me and my cohort here to tackle. He's got a lot of good information for you out there. Let me introduce you to him, shall we? This is one Mr. Anthony Sequera. Anthony, could you do us a little bit of a favor and tell us a bit about yourself? You got it. So my name is Anthony Sequera. As you heard, I am CCIE number 15626. That's in the Cisco space. I don't know why I brought that up just now, but hey, it's interesting about my background that I am a Cisco certified internet work expert. And one of the things that we have to deal with in that certification is network security. One of the things that we'll certainly be discussing. But it is great to be teaching this with Daniel. Daniel could teach this himself. So you've got kind of a dual power packed set of hosts and SMEs for this. Look at security architectures, as Daniel said, and there's a lot of them. There's a lot of different enterprise architectures and there's a lot of security architectures that we could apply to help safeguard our organization. So that's what we'll be discussing. Well, man, you got yourself a one, two punch right here. That's right. Because we do know this topic fairly well and it will be like I said, it's a lot of fun. We like this. We're a little bit passionate about it. That said, Anthony, give us, if you could, a couple of things that we can expect from this series. Yeah. A lot has changed when it comes to enterprises and their architectures. I mean, cloud now is hugely popular. So we're going to be discussing things like cloud, like virtualization, some of the latest buzzwords in our industry. And no, we won't mention chat GPT. I'll just get it out of the way right now. This is the one mention of chat GPT. That's right. That's it. It's the only time we'll say it. It's the overview. But yeah, there's a lot that has changed. So it's going to be really exciting for us to go through and look at some of these new technologies, make sure you're fully up to speed on them, and then most importantly, discuss security implications with them. Oh, man, I am. I'm hot and bothered. I'm ready for this one. What are you most excited about with this specific course? I think I am most excited for the cloud piece just because I've been nerding out on cloud thanks to Azure, AWS, and Google Cloud Platform. And I just think it's really fascinating that we are moving to the cloud at the pace that we are. And it's really interesting to discuss security implications. I'm going to have to agree to agree with you on that one. Good stuff there with the cloud and the virtualization. We love it. It makes our lives easy. So a lot of good stuff is going to come out of what can we do to secure that in this series. So hopefully you find that interesting and we will keep you riveted to your chairs and glued to your screens and learn in that good security information that you need in this series. And we look forward to seeing you there.

Learning Style

On Demand

Length of course

5h 2m
22 Episodes

Here are the topics we'll cover

  • Course Overview
  • Security Architecture Models
  • Securing Enterprise Infrastructures
  • Strategies to Protect Data
  • Resilience in Security Architectures
Learning Options

Options for this course

Train your team
Stay ahead of the curve and future-proof your business with training programs designed for you.
Channel & Reseller
Transform your experience and integrate with our unique evolving library of Audit, Cybersecurity, and Information Technology courses.
Individual learners
Learn at your own pace and get your certification training.