5. Cloud Architecture and Design Module Introduction Well, it’s time for us to tackle our first major section of content in Cloud+. We’re gonna talk about design issues when it comes to cloud. This is one of my favorite subjects because we often think of cloud as some immediate solution, something that’s going to be […]
7. Deployment Options (OBJ. 3.1) In this lesson, we’re going to discuss the different mobile device deployment options that you can use in your organization. Now, a mobile device deployment model describes the way employees are provided with mobile devices and applications to use as part of their job functions. Now, this can be one […]
4. Connectivity Options (OBJ. 3.1) In this lesson, we’re going to talk about connectivity options for your mobile devices and wearables. Specifically, we’re going to discuss NFC, RFID, infrared, Bluetooth, USB peripherals, and tethering. The first connectivity option we need to discuss is NFC or near field communication. Now, NFC devices use a radio frequency […]
1. Enterprise Mobility In this section of the course, we’re going to discuss enterprise mobility and the proper configurations, deployment methods, and security considerations involved with smartphones, tablets and wearable devices that may connect to or communicate with our enterprise networks. Now, in this section, we’re going to be focused on domain three, security, engineering […]
7. Homomorphic Encryption (OBJ 1.8) In this lesson, we’re going to discuss homomorphic encryption and its potential uses in your enterprise security architecture. Now, homomorphic encryption is a form of encryption that permits users to perform calculations on its encrypted data without first decrypting it. By using homomorphic encryption, an organization can process information while […]
4. Big Data (OBJ 1.8) In this lesson, we’re going to discuss the impact of big data on enterprise security and privacy. So what is big data? Well, big data refers to data sets that are so large or so complex that traditional data processing applications are not sufficient to handle them. This data can […]
1. Emerging Technology (OBJ 1.8) In this section of the course, we’re going to discuss some emerging technologies. Throughout this section, we’re going to be focused on domain one security architecture, and specifically objective one eight that states that you must explain the impact of emerging technologies on enterprise security and privacy. Your organization is […]
9. Data Loss Detection (OBJ 1.4) In this lesson, we’re going to discuss data loss detection techniques that you can use to ensure the security of our enterprise data. These techniques include watermarking, digital rights management, network traffic decryption and deep packet inspection, and network traffic analysis. These techniques are important because we can’t stop […]
7. Data Loss Prevention (DLP) (OBJ 1.4) In this lesson, we’re going to talk about data loss prevention, also known as DLP. Now, data loss prevention solutions are used to detect and prevent sensitive information from being stored on unauthorized systems or from being transmitted over unauthorized networks. Essentially, with data loss prevention systems, our […]
5. Deidentification (OBJ 1.4) In dealing with data security, it’s important to protect sensitive data and information that you collect from your users or your customers. One way to do this is use a process known as deidentification, which allows you to still maintain the data collected, but it removes the ability for your organization […]