CompTIA Cybersecurity Analyst+: Hardware & Security
Cybersecurity Analyst+
| Intermediate
- 11 videos | 39m 27s
- Includes Assessment
- Earns a Badge
Securing hardware includes applying firmware updates and configuring devices on isolated networks. In this course, you'll learn about mobile device security, IoT security, and vulnerable device lists. You'll explore physical security and the security risks presented by drones and vehicles. You'll move on to examine how SCADA is used for industrial device networks, how to recognize BIOS and UEFI security settings, how self encrypting drives can protect data at rest, and how hardware security modules are used for encryption offloading and cryptographic secret storage. This course can be used in preparation for the CompTIA Cybersecurity Analyst (CySA+) certification exam CS0-002.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseRecognize how mobile device weaknesses should be addressedRecognize how iot device weaknesses should be addressedAccess and navigate the shodan.io web siteList how to physically secure facilities and computing equipmentDescribe how vehicles such as drones can present security risks
-
Recognize how scada is used for industrial device networksRecognize bios and uefi security settingsRecognize how seds provide protection for data at restRecognize how hsms are used for encryption offloading and the storage of cryptographic secretsSummarize the key concepts covered in this course
IN THIS COURSE
-
2m 8s
-
4m 33sUpon completion of this video, you will be able to recognize how to address mobile device weaknesses. FREE ACCESS
-
3m 27sAfter completing this video, you will be able to recognize how to address IoT device weaknesses. FREE ACCESS
-
5m 19sIn this video, learn how to access and navigate the Shodan website. FREE ACCESS
-
2m 56sAfter completing this video, you will be able to list how to physically secure facilities and computing equipment. FREE ACCESS
-
6m 8sUpon completion of this video, you will be able to describe how vehicles such as drones can present security risks. FREE ACCESS
-
3m 53sUpon completion of this video, you will be able to recognize how SCADA is used for industrial device networks. FREE ACCESS
-
3m 57sAfter completing this video, you will be able to recognize BIOS and UEFI security settings. FREE ACCESS
-
3m 26sUpon completion of this video, you will be able to recognize how SEDs provide protection for data at rest. FREE ACCESS
-
2m 28sUpon completion of this video, you will be able to recognize how HSMs are used for encryption offloading and storing cryptographic secrets. FREE ACCESS
-
1m 14s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.