Csp - Certified Security Principles
Published 11/2022
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 7.60 GB | Duration: 20h 21m
Published 11/2022
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 7.60 GB | Duration: 20h 21m
Prepare for the Mile2® Certified Security Principles (CSP) exam with this course.
What you'll learn
Understanding risk management
Understanding identity and access control
Understanding network security
Understanding data security
Requirements
12 months experience with server administration
Description
This course is provided directly by Mile2®. This official Mile2® video includes an authorized exam prep and exam simulator, available upon request.CSP - Security Principles are your first line of defense, but often the last box is checked! The IT world never stands still! Therefore, neither can IT security. It does not matter if we are talking about the implementation of IoT devices or cloud services, security is important.According to a recent study, the top source of security incidents within a company is the current employees! Mile2 does not want you to be one of them! The Certifed Security Principles, C)SP, the course is going to prepare you for security across the entire environment including understanding risk management, identity, access control, network, and data security.This is just a short list of everything that we cover within this course, which will include new technologies like IoT and cloud services. This course is intended to prepare you to become a benefit to any company that is attempting to improve its security posture! With this Security Principles certification, you will be marketable to any company, anywhere in the globe!The CSP is a part of the following role-based Progressions on the Mile2 Certification Roadmap
Overview
Section 1: Introduction
Lecture 1 Introduction
Section 2: Intro to IT Security
Lecture 2 Lesson 1
Section 3: Risk Management
Lecture 3 Lesson 2
Section 4: Understanding of Cryptography
Lecture 4 Lesson 3
Section 5: Undertanding Identity and Access Management
Lecture 5 Lesson 4
Section 6: Managing Data Security
Lecture 6 Lesson 5
Section 7: Managing Network Security
Lecture 7 Lesson 6
Section 8: Managing Server/Host Security
Lecture 8 Lesson 7
Section 9: Application Security for Non-Developers
Lecture 9 Lesson 8
Section 10: Understanding Mobile Device Security (IoT)
Lecture 10 Lesson 9
Section 11: Managing Day to Day Security
Lecture 11 Lesson 10
Section 12: Understanding Compliance and Auditing
Lecture 12 Lesson 11
IT Professionals,Server Administrators,Virtualization and Cloud Administrators