New Training: Secure Design and Architecture Fundamentals for Enterprise Environments
In this 71-video, entry-level training, CBT Nuggets trainer Keith Barker covers the knowledge network engineers need to design and plan an enterprise network that incorporates cutting-edge security technologies, tools and concepts into the physical and digital architecture.
Keeping a network of any size secure takes foresight and planning. But as the size of the network expands, that foresight and planning expands at a faster rate. Once you hit enterprise-scale networks, the rules of how to plan a secure design look familiar but are much more complex than the rules for small, local networks. This Secure Design and Architecture Fundamentals for Enterprise Environments training explains the security tools, technologies and concepts that a network engineer must be familiar with before setting out to design an enterprise network’s architecture. From physical to digital, cloud to on-prem, learn the fundamentals of keeping an enterprise secure with this training.
The eight-part series covers topics such as providing managed virtualization and cloud compute solutions, managing secure application development, deployment and automation, and designing and implementing authentication and authorization technologies as well as:
The eight skills that comprise this series are:
Security Concepts for the Enterprise
Cloud Computing and Virtualization
Summarize App Development, Deployment, and Automation
Authentication and Authorization Design Concepts
Security for Embedded and Specialized Systems
Physical Security Controls
While this training may not map to a certification, it’s still valuable skills training for network engineers looking to learn network design principles.
Topics this training covers include:
Separation of Duties
System on a Chip (SoC)
This training includes:
6 hour of training
Watch a video from the series:
Here's some more network design principles-related content from the CBT Nuggets blog:
Security Engineer vs Architect: What's the Difference?
Enhance Your IT Security Resume in 7 Steps
Futuristic Security Tools Available Right Now
Start learning network design principles today!