CompTIA Security+: Computing Resources Security Techniques

CompTIA Security+    |    Beginner
  • 9 videos | 35m 42s
  • Includes Assessment
  • Earns a Badge
Rating 5.0 of 2 users Rating 5.0 of 2 users (2)
Today's security professional must contend with more types of computing systems and operating systems than ever before due to mobility, embedded, smart, and Internet of Things (IoT) devices. In this course, you will explore secure baselines and hardening targets. Then you will learn about wireless device installation issues, mobile device solutions, and connection methods. Next, you will investigate wireless security settings, cryptographic protocols, and authentication protocols. Finally, you will discover application security techniques and asset management tasks, including assignment/accounting, monitoring/asset tracking, enumeration, and disposal/decommissioning. This course is part of a series that prepares you for the CompTIA Security+ (SY0-701) exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Define secure baselines
    Describe hardening targets, such as mobile devices, switches, routers, cloud infrastructure, industrial control system (ics)/supervisory control and data acquisition (scada), embedded systems, real-time operating system (rtos), and internet of things (iot) devices
    Provide an overview of wireless device installation issues like site surveys and heat maps
    Compare mobile device solutions, including mobile device management (mdm), sandboxing, bring your own device (byod), corporate-owned, personally enabled (cope), and choose your own device (cyod) deployment models; and compare connection methods like cellular, wi-fi, and bluetooth
  • Describe wireless security settings such as wi-fi protected access 3 (wpa3), authentication, authorization, and accounting (aaa)/remote authentication dial-in user services (radius), cryptographic protocols, and authentication protocols
    Define application security techniques like input validation, secure cookies, static code analysis, and code signing
    Describe asset management elements, including the acquisition/procurement process
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 33s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 3m 11s
    After completing this video, you will be able to define secure baselines. FREE ACCESS
  • Locked
    3.  Hardening Targets
    4m 49s
    Upon completion of this video, you will be able to describe hardening targets, such as mobile devices, switches, routers, cloud infrastructure, industrial control system (ICS)/Supervisory Control and Data Acquisition (SCADA), embedded systems, real-time operating system (RTOS), and Internet of Things (IoT) devices. FREE ACCESS
  • Locked
    4.  Wireless Device Installation Issues
    4m 50s
    After completing this video, you will be able to provide an overview of wireless device installation issues like site surveys and heat maps. FREE ACCESS
  • Locked
    5.  Mobile Device Solutions
    6m 56s
    Upon completion of this video, you will be able to compare mobile device solutions, including mobile device management (MDM), sandboxing, Bring Your Own Device (BYOD), corporate-owned, personally enabled (COPE), and Choose Your Own Device (CYOD) deployment models; and compare connection methods like cellular, Wi-Fi, and Bluetooth. FREE ACCESS
  • Locked
    6.  Wireless Security Settings
    4m 7s
    After completing this video, you will be able to describe wireless security settings such as Wi-Fi Protected Access 3 (WPA3), authentication, authorization, and accounting (AAA)/Remote Authentication Dial-In User Services (RADIUS), cryptographic protocols, and authentication protocols. FREE ACCESS
  • Locked
    7.  Application Security
    6m 3s
    Upon completion of this video, you will be able to define application security techniques like input validation, secure cookies, static code analysis, and code signing. FREE ACCESS
  • Locked
    8.  Asset Management
    4m 45s
    After completing this video, you will be able to describe asset management elements, including the acquisition/procurement process. FREE ACCESS
  • Locked
    9.  Course Summary
    29s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.7 of 266 users Rating 4.7 of 266 users (266)
Rating 4.6 of 30 users Rating 4.6 of 30 users (30)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)