CompTIA Cybersecurity Analyst+: Hardware & Security

Cybersecurity Analyst+    |    Intermediate
  • 11 videos | 39m 27s
  • Includes Assessment
  • Earns a Badge
Rating 4.2 of 164 users Rating 4.2 of 164 users (164)
Securing hardware includes applying firmware updates and configuring devices on isolated networks. In this course, you'll learn about mobile device security, IoT security, and vulnerable device lists. You'll explore physical security and the security risks presented by drones and vehicles. You'll move on to examine how SCADA is used for industrial device networks, how to recognize BIOS and UEFI security settings, how self encrypting drives can protect data at rest, and how hardware security modules are used for encryption offloading and cryptographic secret storage. This course can be used in preparation for the CompTIA Cybersecurity Analyst (CySA+) certification exam CS0-002.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Recognize how mobile device weaknesses should be addressed
    Recognize how iot device weaknesses should be addressed
    Access and navigate the shodan.io web site
    List how to physically secure facilities and computing equipment
    Describe how vehicles such as drones can present security risks
  • Recognize how scada is used for industrial device networks
    Recognize bios and uefi security settings
    Recognize how seds provide protection for data at rest
    Recognize how hsms are used for encryption offloading and the storage of cryptographic secrets
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 2m 8s
  • 4m 33s
    Upon completion of this video, you will be able to recognize how to address mobile device weaknesses. FREE ACCESS
  • Locked
    3.  IoT Security
    3m 27s
    After completing this video, you will be able to recognize how to address IoT device weaknesses. FREE ACCESS
  • Locked
    4.  Vulnerable Device Lists
    5m 19s
    In this video, learn how to access and navigate the Shodan website. FREE ACCESS
  • Locked
    5.  Physical Security
    2m 56s
    After completing this video, you will be able to list how to physically secure facilities and computing equipment. FREE ACCESS
  • Locked
    6.  Drones and Vehicles
    6m 8s
    Upon completion of this video, you will be able to describe how vehicles such as drones can present security risks. FREE ACCESS
  • Locked
    7.  SCADA
    3m 53s
    Upon completion of this video, you will be able to recognize how SCADA is used for industrial device networks. FREE ACCESS
  • Locked
    8.  BIOS and UEFI
    3m 57s
    After completing this video, you will be able to recognize BIOS and UEFI security settings. FREE ACCESS
  • Locked
    9.  Self Encrypting Drives
    3m 26s
    Upon completion of this video, you will be able to recognize how SEDs provide protection for data at rest. FREE ACCESS
  • Locked
    10.  Hardware Security Module
    2m 28s
    Upon completion of this video, you will be able to recognize how HSMs are used for encryption offloading and storing cryptographic secrets. FREE ACCESS
  • Locked
    11.  Course Summary
    1m 14s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 3 users Rating 5.0 of 3 users (3)
Rating 4.6 of 123 users Rating 4.6 of 123 users (123)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.3 of 56 users Rating 4.3 of 56 users (56)
Rating 4.2 of 26 users Rating 4.2 of 26 users (26)
Rating 4.6 of 60 users Rating 4.6 of 60 users (60)