Security Architecture: Secure Network Integrations for CompTIA SecurityX

Learn how to design and implement secure network integrations, protecting against modern threats. This course will teach you the advanced security architecture strategies for the CompTIA SecurityX exam.

  • Last updated 6/2024
  • English
  • Published 2025-04-24
  • Location Online
  • Duration 52m 4s
What you'll learn

Security architecture is a complex and ever-evolving field, and ensuring a secure network integration can be a challenging problem for many organizations. In this course, Security Architecture: Secure Network Integrations for CompTIA SecurityX, you'll learn to design and implement secure network integrations that protect against modern threats and vulnerabilities. First, you'll explore integrating appropriate controls in secure architecture design, focusing on attack surface management and data protection. Next, you'll discover how to apply security concepts to access, authenticate, and authorize systems, incorporating practices like provisioning/deprovisioning and single sign-on (SSO). Finally, you'll learn how to implement cloud capabilities in enterprise environments, covering Cloud Access Security Brokers (CASB), shared responsibility models, and container security. When you're finished with this course, you'll have the skills and knowledge of secure network architecture needed for the CompTIA SecurityX exam.

This course includes:

 

Security Architecture Design

2m 58s

  • Introduction to Security Architecture Integrations | 2m 58s

 

Security Architecture Design

15m 40s

  •  Attack Surface Management and Reduction | 2m 36s
  •  Detection and Threat Hunting Enablers | 2m 7s
  •  Information and Data Security Design | 2m 15s
  •  Data Loss Prevention | 2m 17s
  •  Hybrid Infrastructure and Third-party Integrations | 3m 4s
  •  Measuring Control Effectiveness | 3m 18s

 

Access, Authentication, and Authorization Systems

14m 51s

  •  Secure Provisioning and Deprovisioning | 2m 31s
  •  Authentication Formats and Providers | 2m 6s
  •  Policy Enforcement and Auditing | 2m 33s
  •  Access Control Models | 2m 9s
  •  Public Key Infrastructure | 3m 6s
  •  Access Control Systems | 2m 23s

 

Security in Cloud Environments

17m 1s

  •  Shared Responsibility Model | 2m 29s
  •  Cloud Access Security Brokers | 1m 21s
  •  Infrastructure as Code | 1m 54s
  •  Container Security | 1m 38s
  •  Serverless Security | 2m 6s
  •  API Security | 1m 45s
  •  Cloud Service Integration | 2m 58s
  •  Cloud Control Strategies | 2m 47s

 

Domain Summary

1m 32s

  •  Domain Summary | 1m 32s