CompTIA Security+: Enterprise Security Capabilities
CompTIA Security+
| Beginner
- 13 videos | 53m 36s
- Includes Assessment
- Earns a Badge
This course is a vital exploration of many of the day-to-day operational controls that the security professional is often involved with. This is what is referred to as the "due care" aspect of the job or ongoing continual maintenance. In other words, these are core "blue team" responsibilities. Topics presented to the learner include firewalls, intrusion detection system (IDS)/intrusion prevention system (IPS), web filtering, operating system security, implementing secure protocols, DNS filtering, email security, DomainKeys Identified Mail (DKIM), Sender Policy Framework (SPF), gateways, File Integrity Monitoring (FIM), data loss prevention (DLP), network access control (NAC), endpoint detection and response (EDR), Extended Detection and Response (XDR), and user behavior analytics (UBA). This course is part of a series that prepares you for the CompTIA Security+ (SY0-701) exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseReview various firewall implementations like rule-based, access lists, ports and protocols, and screened subnetsCompare intrusion detection to intrusion prevention servicesOutline the use of web filters, including agent-based, centralized proxies, url scanning, content categorization, block rules, and reputation filteringProvide an overview of operating system security like group policy and selinuxOutline how to implement secure protocols, including protocol selection, port selection, and transport methodProvide an overview of dns filtering, including dnssec and opendns solutions
-
Outline the use of email security mechanisms like domain-based message authentication reporting and conformance (dmarc), domainkeys identified mail (dkim), sender policy framework (spf), and gatewaysProvide an overview of file integrity monitoringOutline data loss prevention initiatives and solutionsProvide an overview of network access (or admission) control (nac)Outline the use of endpoint detection and response (edr) solutions, including extended detection and response (xdr) and user behavior analytics (uba)Summarize the key concepts covered in this course
IN THIS COURSE
-
41sIn this video, we will discover the key concepts covered in this course. FREE ACCESS
-
7m 55sIn this video, we will review various firewall implementations like rule-based, access lists, ports and protocols, and screened subnets. FREE ACCESS
-
5m 34sAfter completing this video, you will be able to compare intrusion detection to intrusion prevention services. FREE ACCESS
-
3m 32sUpon completion of this video, you will be able to outline the use of web filters, including agent-based, centralized proxies, URL scanning, content categorization, block rules, and reputation filtering. FREE ACCESS
-
5m 24sAfter completing this video, you will be able to provide an overview of operating system security like group policy and SELinux. FREE ACCESS
-
3m 53sUpon completion of this video, you will be able to outline how to implement secure protocols, including protocol selection, port selection, and transport method. FREE ACCESS
-
5m 2sAfter completing this video, you will be able to provide an overview of DNS filtering, including DNSSEC and OpenDNS solutions. FREE ACCESS
-
7m 15sUpon completion of this video, you will be able to outline the use of email security mechanisms like Domain-based Message Authentication Reporting and Conformance (DMARC), DomainKeys Identified Mail (DKIM), Sender Policy Framework (SPF), and gateways. FREE ACCESS
-
2m 14sAfter completing this video, you will be able to provide an overview of file integrity monitoring. FREE ACCESS
-
3m 7sUpon completion of this video, you will be able to outline data loss prevention initiatives and solutions. FREE ACCESS
-
5m 9sAfter completing this video, you will be able to provide an overview of network access (or admission) control (NAC). FREE ACCESS
-
3m 12sUpon completion of this video, you will be able to outline the use of endpoint detection and response (EDR) solutions, including extended detection and response (XDR) and user behavior analytics (UBA). FREE ACCESS
-
40sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.