CompTIA Security+: Computing Resources Security Techniques
CompTIA Security+
| Beginner
- 9 videos | 35m 42s
- Includes Assessment
- Earns a Badge
Today's security professional must contend with more types of computing systems and operating systems than ever before due to mobility, embedded, smart, and Internet of Things (IoT) devices. In this course, you will explore secure baselines and hardening targets. Then you will learn about wireless device installation issues, mobile device solutions, and connection methods. Next, you will investigate wireless security settings, cryptographic protocols, and authentication protocols. Finally, you will discover application security techniques and asset management tasks, including assignment/accounting, monitoring/asset tracking, enumeration, and disposal/decommissioning. This course is part of a series that prepares you for the CompTIA Security+ (SY0-701) exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDefine secure baselinesDescribe hardening targets, such as mobile devices, switches, routers, cloud infrastructure, industrial control system (ics)/supervisory control and data acquisition (scada), embedded systems, real-time operating system (rtos), and internet of things (iot) devicesProvide an overview of wireless device installation issues like site surveys and heat mapsCompare mobile device solutions, including mobile device management (mdm), sandboxing, bring your own device (byod), corporate-owned, personally enabled (cope), and choose your own device (cyod) deployment models; and compare connection methods like cellular, wi-fi, and bluetooth
-
Describe wireless security settings such as wi-fi protected access 3 (wpa3), authentication, authorization, and accounting (aaa)/remote authentication dial-in user services (radius), cryptographic protocols, and authentication protocolsDefine application security techniques like input validation, secure cookies, static code analysis, and code signingDescribe asset management elements, including the acquisition/procurement processSummarize the key concepts covered in this course
IN THIS COURSE
-
33sIn this video, we will discover the key concepts covered in this course. FREE ACCESS
-
3m 11sAfter completing this video, you will be able to define secure baselines. FREE ACCESS
-
4m 49sUpon completion of this video, you will be able to describe hardening targets, such as mobile devices, switches, routers, cloud infrastructure, industrial control system (ICS)/Supervisory Control and Data Acquisition (SCADA), embedded systems, real-time operating system (RTOS), and Internet of Things (IoT) devices. FREE ACCESS
-
4m 50sAfter completing this video, you will be able to provide an overview of wireless device installation issues like site surveys and heat maps. FREE ACCESS
-
6m 56sUpon completion of this video, you will be able to compare mobile device solutions, including mobile device management (MDM), sandboxing, Bring Your Own Device (BYOD), corporate-owned, personally enabled (COPE), and Choose Your Own Device (CYOD) deployment models; and compare connection methods like cellular, Wi-Fi, and Bluetooth. FREE ACCESS
-
4m 7sAfter completing this video, you will be able to describe wireless security settings such as Wi-Fi Protected Access 3 (WPA3), authentication, authorization, and accounting (AAA)/Remote Authentication Dial-In User Services (RADIUS), cryptographic protocols, and authentication protocols. FREE ACCESS
-
6m 3sUpon completion of this video, you will be able to define application security techniques like input validation, secure cookies, static code analysis, and code signing. FREE ACCESS
-
4m 45sAfter completing this video, you will be able to describe asset management elements, including the acquisition/procurement process. FREE ACCESS
-
29sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.