Welcome to cyber is video Siris on the company s security plus 5 +01 certification and exam.
I'm your instructor, Ron Warner.
Please visit cyber dot i t. For more information on this certification and many others
in the security plus domain three on architecture and design,
you are to explain use cases and purposes for frameworks, best practices and secure configuration guides.
This includes industry standard frameworks and reference architectures both regulatory and non regulatory and industry specific frameworks.
It's necessary for you to understand concepts and regulations such as GDP are
HIPPA G l B A. In an industry, specific frameworks like P. C. I. D. S s
should also understand how to create and use benchmarks and secure configuration guides
and leveraging concepts such as defence in depth and layers as a basis for secure architecture.
Creating a safe design is just the first step. So you should also understand and have the ability to implement secure network architecture concepts
from creating a secure IT apology with different zones such as a d m Z intranet, extra net, etcetera with each specific controls to implementing segregation, segmentation and isolation, either by physical needs or with virtual ization.
Other required concepts include the practical use of tunneling and VPN, either for site to site communications
war to allow remote users access.
Also, talk about correctly placing security devices such as firewall sensors, collectors and protecting software to find networks.
Another important task is implementing secure systems design, including aspects related to hardware and firmware security.
Protecting operating systems and peripherals
should also demonstrate how you understand and can leverage the importance of secure staging deployment concepts
with secure application development. How to move it into production. We'll talk about sand boxing, segregation of environment, defining a clear and understood secure base line
and performing integrity management.
Other topics related to secure architecture and design includes summarizing secure application development and deployment concepts such as life cycle models, Secure Dev ops, secure coding techniques, code quality and testing, understanding cloud and virtual ization concepts, including the used
of different types of hyper visors.
Cloud storage cloud deployment models such as P. A. S s. A s where I as using private public hybrid or community cloud environment.
We'll talk about the differences and security advantages of multiple strategies on premise versus hosted versus cloud and the concepts of cloud access, security broker and security as a service. But you are also required to explain how resiliency and
automation strategies such as using scripts and templates,
having a master image, adopting elasticity and scalability, redundancy and fault tolerance, how all of these congee used to reduce risk.
You should also be able to describe the importance of physical security controls, such as physical barriers like gates and fences. Having security guards, proper signs, alarms, locks,
cameras and digital surveillance, and the use of motion detection and key management.
All of these topics will be covered in domain three on architecture and design.