Security Architecture: Secure Network Design for CompTIA SecurityX

Unlock the secrets of secure network design with expert guidance. This course will teach you the advanced security architecture strategies needed for the CompTIA SecurityX exam.

  • Last updated 6/2024
  • English
  • Published 2025-04-24
  • Location Online
  • Duration 41m 25s
What you'll learn

In today's digital world, the security of network architectures is paramount to protecting data and ensuring system resilience against cyber threats.

In this course, Security Architecture: Secure Network Design for CompTIA SecurityX, you’ll learn to design secure network architectures that are resilient, adaptable, and aligned with the Zero Trust model.

First, you’ll explore how to analyze requirements to design resilient systems, understanding the placement and configuration of critical security components like firewalls, IPS/IDS, and VPNs.

Next, you’ll discover how to integrate security throughout the systems life cycle, from defining security requirements to managing supply chain risks and considering end-of-life processes.

Finally, you’ll learn how to apply Zero Trust concepts in system architecture design, focusing on continuous authorization, network segmentation, and deperimeterization strategies.

When you’re finished with this course, you’ll have the skills and knowledge of secure network design needed for the CompTIA SecurityX exam, ensuring you’re well-prepared to tackle current and future security challenges.

This course includes:

 

Course Overview

1m 34s

  • Course Overview | 1m 34s

 

Designing Resilient Systems

13m 22s

  •  Introduction to Security Architecture | 2m 40s
  •  Component Analysis for Security | 7m 1s
  •  Availability and Integrity | 3m 41s

 

Security throughout the Systems Life Cycle

14m 2s

  •  Securing the Development Lifecycle | 5m 59s
  •  Software Assurance and Testing | 3m 2s
  •  Continuous Integration and Continuous Deployment | 2m 33s
  •  Managing Supply Chain and Hardware Security | 2m 27s

 

Zero Trust Architecture Design

10m 56s

  •  Foundations of Zero Trust | 4m 7s
  •  Zero Trust in Networks | 4m 39s
  •  Additional Zero Trust Strategies | 2m 9s

 

Domain Summary

1m 29s

  •  Domain Summary | 1m 29s