1. Home
  2. Training Library
  3. IT infrastructure security

Summary

Contents

keyboard_tab
Introduction [CISMP]
Auditing
4
Auditing
2m 30s
Summary [CISMP]

The course is part of this learning path

Summary

Here you’ll recap the key areas of focus in this Learning Path:

  • Protection from malicious software such as: worms, viruses and Trojans. You learnt about ways to mitigate the associated of malicious attacks.
  • Secure network management, firewalls, authentication and communications all work to add layers of security protection for individuals and organisations.
  • Virtualisation and cloud computing offer many opportunities for productivity and efficiency. Being aware of how the ISO/IEC work to reduce the security problems using enhanced security controls.
  • Network infrastructure security practises prevent hackers and malicious application form infiltrating the network. Auditing, pen testing, patching, back-ups, and monitoring are a few ways that you can configure your system to detect abnormal behaviours.

What's next?

Well done! You've now completed IT Infrastructure security. In the next Learning Path, you'll be introduced to cryptography and discover its central role in cyber security.

 

Difficulty
Beginner
Duration
17m
Students
12
Description

In this course on IT infrastructure security, we’ll be looking at the SD3 framework and some modern development approaches that seek to incorporate security into the development right from the beginning. You’ll also look at detection and testing in some detail.

About the Author
Students
23520
Labs
113
Courses
884
Learning Paths
43

A world-leading tech and digital skills organization, we help many of the world’s leading companies to build their tech and digital capabilities via our range of world-class training courses, reskilling bootcamps, work-based learning programs, and apprenticeships. We also create bespoke solutions, blending elements to meet specific client needs.