CompTIA CASP+: Storage & Network Security
CompTIA
| Intermediate
- 16 videos | 1h 47m 4s
- Includes Assessment
- Earns a Badge
On-premises and cloud-based storage security solutions are very similar in nature. In this course, you'll learn how to determine which RAID disk solution best applies in a given situation, as well as how to secure various network storage solutions and DNS. Next, you'll learn to recognize when to apply firewalls to secure networks and how to configure various firewall solutions. Moving on, you'll explore how to configure a VPN and secure wired and wireless networks. Lastly, you'll examine how to manage servers through a jump box and how attackers enable reverse shells. This course is one of a collection of courses that prepares learners for the CompTIA Advanced Security Practitioner (CASP+) CAS-004 exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDifferentiate between raid levelsConfigure software raid using windows serverConfigure software raid using ubuntu linuxIdentify various types of network storage solutionsApply hardening techniques to dnsIdentify different types of firewallsConfigure the azure firewall
-
Configure firewall settings on a windows hostRecognize how vpns secure remote network trafficConfigure a point-to-site vpn for the azure cloudSummarize wired network security concernsSummarize wireless network security concernsUse an azure bastion host as a jump box for server managementEstablish a reverse shell using netcatSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 35sHere, you’ll learn more about your instructor and this course. In this course, you’ll learn how to determine which RAID disk solution best applies in a given situation. You’ll also learn how to secure various network storage solutions and DNS. Next, you’ll learn how to recognize when to apply firewalls to secure networks and how to configure various firewall solutions. You’ll then configure a VPN and learn how to secure wired and wireless networks. FREE ACCESS
-
6m 34sHere, you’ll learn about RAID. RAID stands for Redundant Array of Inexpensive Disks, or Redundant Array of Independent Disks. Here, you’ll learn the purpose of RAID and how it's related to security and data availability. With RAID, you have a group of physical disks that work together. This can improve performance and availability. FREE ACCESS
-
8m 12sHere, you’ll learn how to enable software RAID in Windows. This software enhances the performance or fault tolerance. This is the resiliency of a disk subsystem, using software instead of a hardware RAID controller. You might have multiple disks working together as one logical disk, as it's seen by the operating system. What you’ll do here is configure software RAID in Windows Server. FREE ACCESS
-
7m 24sHere, you’ll learn how to enable software RAID in Ubuntu Linux. Software RAID is not preferred as hardware because hardware RAID uses a circuit board designed to work with multiple disks and have them work together. It's considered more resilient, more stable, and robust than software RAID. However, software RAID is the next best thing to use to increase disk performance or data availability in the absence of a hardware RAID controller. FREE ACCESS
-
8m 13sHere, you’ll learn more about network storage. Data is by far the most important asset in a computing environment. This means you must think about storage security. With network storage, you have centralized storage that's accessible by multiple devices. It allows for backups in a central location that you can secure, perhaps by encrypting or storing copies of it in other locations. The files themselves can be called binary large objects or BLOBS. FREE ACCESS
-
6m 18sHere, you’ll learn more about securing DNS. You can secure DNS in a number of ways, one of which is using DNS over HTTPS, otherwise called DoH. Instead of clients sending DNS requests to DNS servers in clear text, it would encrypt it and send it over HTTPS. This uses the standard HTTPS port 443. You can also enable DNSSEC or DNS Security. FREE ACCESS
-
8m 8sYou’ll learn more about firewalls. Firewalls can restrict traffic coming into or out of a network, a host on the network, or an application running on a host. The placement of the firewall is important. Perimeter firewalls are important around the network's edge, but so are individual host-based firewalls on all devices. There are a number of different types of firewalls you can work with. You’ll take a look at each of these. FREE ACCESS
-
11m 39sHere, you’ll learn how to deploy Azure firewall. There are many different types of firewall implementations, and they're all important in restricting the flow of traffic to where it should be going. In Microsoft Azure, you’ll configure the Azure firewall. Here, you’ll use it as a standard packet filtering type of firewall. First, you’ll take a look at your existing virtual network configuration in your cloud environment. FREE ACCESS
-
7m 35sHere, you’ll learn to manage the Windows Defender firewall. It’s important to make sure you have firewalls running on each individual host and that they're configured accordingly. Ideally, everything's blocked, aside from the exceptions you've added to allow traffic into or out of the host. In your Windows Server, you’ll configure firewall settings using Windows Defender. FREE ACCESS
-
6m 8sHere, you’ll learn more about VPNs. A Virtual Private Network or VPN provides remote access to a private network. It's an end-to-end point connection, which might allow users to work from home and access corporate resources. A VPN uses an encrypted network tunnel between two endpoints. What you’ll end up with is encryption of data in transit. There are a number of different types of VPN protocols. FREE ACCESS
-
8m 6sIn this demonstration, you’ll be configuring VPN client connectivity to the Microsoft Azure cloud. In Azure, you’ll see the VPN appliance side of things via a virtual-private-gateway type of configuration. Now, you’ll make sure you can get the client connected through PKI certificate authentication. One way to do that is to generate your own self-signed root certificate, which you’ll do through PowerShell. FREE ACCESS
-
9m 2sHere, you’ll learn about wired network security. There are many ways to harden a wired network environment. One of these is to use air-gapped networks. In some cases, you might have mission-critical services running on a network. Because of the sensitivity of those networks, you might want to make sure they are not physically connected to any other network that would allow connectivity to or from the internet, hence air-gapped networks. FREE ACCESS
-
7m 27sHere, you’ll learn about wireless network security. The Zigbee network protocol is used for IoT home automation, which requires wireless connectivity. It doesn't use IP addresses. It protects transmissions over the network using AES 128-bit encryption. This is another short-range wireless technology where devices need to be paired together to communicate. FREE ACCESS
-
4m 16sHere, you’ll learn how to manage servers through a jump box. When you deploy virtual machines into the cloud, you won’t make them exposed publicly via a public IP address. Ideally, those virtual machines would have only private IP addresses. They would go through a jump box host to gain access to remotely manage those hosts with private IPs. In Azure, that jump box solution is called Azure Bastion. FREE ACCESS
-
5m 13sHere, you’ll learn how to use NetCat to establish a reverse shell. Fooling victims into clicking links or downloading and running file attachments is one way social engineering tricks people into infecting their machines with malware. One form of that type of malware is setting up a reverse shell. A reverse shell allows a victim machine that's been infected with malware to make an outbound connection to the attacker station. FREE ACCESS
-
1m 16sHere, you’ll summarize what you’ve learned in the course. You’ve learned how to apply RAID levels and network storage solutions, where appropriate. You also learned to configure firewall rules, enable VPNs, and recognize how to secure wired and wireless networks. You explored Redundant Array of Inexpensive Disks and enabled software RAID in Windows and Linux. You examined network storage and learned how to secure DNS. Finally, you examined firewalls and deployed Azure Firewall. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.