Every day we hear of another company that's been hacked many with millions of user records stolen, leaked to the dark web, or sold to the highest bidder. Understanding what makes an effective security posture is essential to combating this ever-changing threat. In this course, Security Architecture and Design: The Big Picture, you'll learn the essential foundations of what makes an effective information security program along with what infrastructure and applications are required. First, you'll learn about installing and configuring network components, then you'll learn about secure protocols. Next, you'll explore implementing secure network architecture and troubleshooting common security issues. Finally, you'll discover secure systems design, application development and deployment, and physical security controls. When you're finished this course, you'll have a good understanding of the various pieces that make up a solid security posture. Not only will you understand all major components of information security, but also how they fit together, and how to architect them according to best practices, to protect a company's data and digital assets.
- Documenting and Communicating Security Incidents
- Communicating and Documenting in Incident Response
- Communicating Techniques
- Capturing Evidence