Course objectives
After completing this course, students will be able to:
- Design a Zero Trust strategy and architecture
- Evaluate Governance Risk Compliance (GRC) technical strategies and security operations strategies
- Design security for infrastructure
- Design a strategy for data and applications
Course outlines
- Build an overall security strategy and architecture
- Design a security operations strategy
- Design an identity security strategy
- Evaluate a regulatory compliance strategy
- Evaluate security posture and recommend technical strategies to manage risk
- Understand architecture best practices and how they are changing with the Cloud
- Design a strategy for securing server and client endpoints
- Design a strategy for securing PaaS, IaaS, and SaaS services
- Specify security requirements for applications
- Design a strategy for securing data