When you enroll through our links, we may earn a small commission—at no extra cost to you. This helps keep our platform free and inspires us to add more value.

pluralsight logo

Implementation of Secure Solutions for CompTIA Security+

This course will teach you the fundamentals and key concepts around secure protocols, hardware and software technologies, and various use cases to illustrate how they function to keep a company’s assets and data secure.

     
  • 4
  •  |
  • Reviews ( 27 )
Free
Implementation of Secure Solutions for CompTIA Security+

This Course Includes

  • iconpluralsight
  • icon4 (27 reviews )
  • icon6 hour 16 minutes
  • iconenglish
  • iconOnline - Self Paced
  • iconcore courses
  • iconpluralsight

About Implementation of Secure Solutions for CompTIA Security+

In this course, you’ll learn about the various ways you can secure your

company’s systems, network and data using secure protocols, hardware

and software. First, you’ll learn about secure protocols and their various

use cases. Next, you’ll learn about the hardware that helps harden a

company’s security posture including endpoint protection, encryption

mechanisms, database and application security, and network access

control. Next, you’ll learn about securing WiFi and mobile solutions, along

with protecting data in the cloud. Lastly, you’ll learn about authentication

and public key infrastructure. When you’ve finished the course, you’ll

have the knowledge necessary to pass the

Implementation domain of the CompTIA Security+ exam as well as the skills required to secure your company’s data both on-prem and in the cloud.

What You Will Learn?

  • Course Overview : 1min.
  • Implementing Secure Protocols : 25mins.
  • Understanding Host or Application Security Solutions : 50mins.
  • Implementing Secure Network Designs Part 1 : 44mins.
  • Implementing Secure Network Designs Part 2 : 44mins.
  • Installing and Configuring Wireless Security Settings : 34mins.
  • Implementing Secure Mobile Solutions : 39mins.
  • Applying Cybersecurity Solutions to the Cloud : 34mins.
  • Implementing Identity and Account Management Controls : 33mins.
  • Implementing Authentication and Authorization Solutions : 38mins.
  • Implementing Public Key Infrastructure : 28mins.