We may earn an affiliate commission when you visit our partners.
Pluralsight logo

Managing SUSE Linux Enterprise

Matt Conran

In this course, you will gain the knowledge to implement the new approach to securing your network infrastructure and applications using the software-defined perimeter approach to zero trust (SDP). SDP makes protected assets invisible.

Read more

In this course, you will gain the knowledge to implement the new approach to securing your network infrastructure and applications using the software-defined perimeter approach to zero trust (SDP). SDP makes protected assets invisible.

One of today's biggest problems is that network infrastructure and applications are wide open to severe security threats.

In this course, Software-Defined Perimeter (SDP): Leveraging Zero Trust to Create a New Network and Security Architecture, you will learn foundational knowledge to protect all valuable assets from both external and internal threats.

First, you will learn why you need to adopt a zero trust software-defined perimeter. Next, you will discover the functions of a software-defined perimeter and the advantages this will bring you. Finally, you will explore how to create a software-defined perimeter.

When you're finished with this course, you will have the skills and knowledge needed to secure your infrastructure and applications from a variety of attacks that are common today.

Enroll now

What's inside

Syllabus

Course Overview
Validating Connectivity within Zero Trust SDP
Functions of SDP: What Can SDP Be Used For?
Creating an SDP Network: The Components Involved
Read more

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
May be difficult for beginners due to the foundational knowledge required to grasp the concepts presented
Teaches network security using the software-defined perimeter approach, which is a standard in the industry
Develops foundational knowledge in network security, a core skill for cybersecurity professionals
Provides a strong foundation for those seeking to strengthen their knowledge in network security
Covers the creation of a software-defined perimeter, which can improve network visibility and control

Save this course

Save Managing SUSE Linux Enterprise to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for Managing SUSE Linux Enterprise. These are activities you can do either before, during, or after a course.

Career center

Learners who complete Managing SUSE Linux Enterprise will develop knowledge and skills that may be useful to these careers:
Network Security Engineer
Network Security Engineers are responsible for protecting computer networks from unauthorized access, use, disclosure, disruption, modification, or destruction. They may also be responsible for developing and implementing security policies and procedures.
Information Security Analyst
Information Security Analysts identify, assess, and mitigate risks to an organization's information systems. They may also be responsible for developing and implementing security policies and procedures.
Security Architect
Security Architects design, implement, and manage security solutions for an organization's information systems. They may also be responsible for developing and implementing security policies and procedures.
Security Consultant
Security Consultants help organizations develop and implement security solutions. They may also be responsible for conducting security assessments and recommending security measures.
Network Administrator
Network Administrators ensure computer networks run smoothly and are as efficient and secure as possible. They may be responsible for the installation of new hardware and software as well as the monitoring and maintenance of data.
Software Engineer
Software Engineers design, develop, and test software applications. They may also be responsible for writing code and performing quality assurance testing.
Database Administrator
Database Administrators ensure databases run smoothly and are as efficient and secure as possible. They may be responsible for the installation of new hardware and software as well as the monitoring and maintenance of data.
Systems Administrator
Systems Administrators ensure computer systems run smoothly and are as efficient and secure as possible. They may be responsible for the installation of new hardware and software as well as the monitoring and maintenance of data.
Project Manager
Project Managers plan, execute, and close projects. They may also be responsible for managing budgets and timelines.
Business Analyst
Business Analysts analyze business processes and identify opportunities for improvement. They may also be responsible for developing and implementing new business solutions.
Technical Writer
Technical Writers create documentation for technical products and services. They may also be responsible for writing user manuals, training materials, and other technical documents.
Sales Engineer
Sales Engineers help customers evaluate and select products and services. They may also be responsible for providing technical support and training.
Account Manager
Account Managers manage relationships with customers. They may also be responsible for sales and marketing activities.
Marketing Manager
Marketing Managers plan and execute marketing campaigns. They may also be responsible for developing and managing marketing budgets.
Human Resources Manager
Human Resources Managers plan and execute human resources programs. They may also be responsible for developing and managing human resources policies and procedures.

Reading list

We've selected 11 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Managing SUSE Linux Enterprise.
Provides a comprehensive overview of zero trust networks, including the benefits, challenges, and best practices for implementing a zero trust architecture. It valuable resource for anyone looking to learn more about zero trust and how to apply it to their own organization.
Provides a comprehensive overview of security engineering, including the principles, practices, and tools for building secure distributed systems. It valuable resource for anyone looking to learn more about security engineering and how to apply it to their own systems.
Provides a comprehensive overview of cryptography engineering, including the principles, practices, and tools for designing and implementing secure systems. It valuable resource for anyone looking to learn more about cryptography engineering and how to apply it to their own systems.
Provides a comprehensive overview of applied cryptography, including the principles, practices, and tools for using cryptography in real-world applications. It valuable resource for anyone looking to learn more about applied cryptography and how to use it to protect their data and systems.
Provides a comprehensive overview of network penetration testing, including the principles, practices, and tools for performing network penetration tests. It valuable resource for anyone looking to learn more about network penetration testing and how to perform their own network penetration tests.
Provides a comprehensive overview of network security with OpenSSL, including the principles, practices, and tools for using OpenSSL to secure your network.
Provides a comprehensive overview of Metasploit, including the principles, practices, and tools for using Metasploit to perform penetration testing. It valuable resource for anyone looking to learn more about Metasploit and how to use it to test the security of their own systems.
Provides a comprehensive overview of web application hacking techniques, including the principles, practices, and tools for finding and exploiting security flaws in web applications.
Provides a comprehensive overview of network security, including the threats, vulnerabilities, and best practices for protecting your network. It valuable resource for anyone looking to learn more about network security and how to protect their own network.
Provides a comprehensive overview of cloud security, including the threats, vulnerabilities, and best practices for protecting your cloud environment. It valuable resource for anyone looking to learn more about cloud security and how to protect their own cloud environment.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Managing SUSE Linux Enterprise.
Zero Trust Networking (ZTN): The Big Picture
Most relevant
Introduction to Zero Trust
Most relevant
HashiCorp Boundary: First Look
Most relevant
Zero Trust Architecture (ZTA): Strategize and Establish
Most relevant
Palo Alto Networks Cybersecurity Foundation
Most relevant
Intel® Network Academy - Network Transformation 101
Most relevant
VMware NSX-T Data Center: Troubleshooting and Repairing...
Most relevant
Intel Telco Cloud Technologies
Managing Microsoft Azure Virtual Networks
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser