• Online, Self-Paced
Course Description

Modern on-premises and cloud networks consist of many types of network devices, hosts, and services. Each of these must be configured and monitored to ensure continued compliance with organizational security policies.

In this course, learn about security misconfiguration attack criteria, including using default credentials, leaving unnecessary services running, and exposing services unnecessarily to the Internet. Next, explore application container management, including how to pull containers from Docker Hub and start them. Finally, examine how containers relate to security, how to harden security settings through Group Policy, and how to manage software updates on-premises and in the cloud.

Upon completion, you'll be able to detect security misconfigurations and deploy solutions to rectify weaknesses.

Learning Objectives

{"discover the key concepts covered in this course"}

Framework Connections