CompTIA Security+: Fundamental Security Concepts

CompTIA Security+    |    Beginner
  • 11 videos | 33m 43s
  • Includes Assessment
  • Earns a Badge
Rating 4.9 of 13 users Rating 4.9 of 13 users (13)
The Security+ candidate must display competency in an assortment of core security concepts including the newer Zero Trust initiative and common physical security controls. In this course, the learner will explore gap analysis, Zero Trust control and data planes, deception technologies like honeynets, physical security controls, Change Management business processes and technical implications, and documentation and version control. This course is part of a series that prepares you for the CompTIA Security+ (SY0-701) exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Outline the use of gap analysis in the context of security
    Provide an overview of the zero trust control plane including adaptive identity, threat scope reduction, policy-driven access control, and policy administrator
    Provide an overview of the zero trust data plane which includes implicit trust zones, subject/system, and policy enforcement points
    Compare deception technologies such as honeypots, honeynets, honeyfiles, and honeytokens
    Define preventative physical security controls like bollards, access control vestibule, access badges/cards, fencing, gates, mantraps, and security guards
  • Outline detective physical security controls like video surveillance, lighting, and infrared, pressure, microwave, and ultrasonic sensors
    Outline change management business processes including approval, ownership, stakeholders, impact analysis, test results, backout plan, maintenance window, and standard operating procedures
    Define change management technical implications like allow lists, deny lists, restricted activities, downtime, service restart, application restart, legacy applications, and dependencies
    Understand the importance of comprehensive documentation and version control
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 36s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 2m 20s
    Upon completion of this video, you will be able to outline the use of gap analysis in the context of security. FREE ACCESS
  • Locked
    3.  Zero Trust Control Plane
    4m 37s
    After completing this video, you will be able to provide an overview of the Zero Trust control plane including adaptive identity, threat scope reduction, policy-driven access control, and Policy Administrator. FREE ACCESS
  • Locked
    4.  Zero Trust Data Plane
    1m 49s
    Upon completion of this video, you will be able to provide an overview of the Zero Trust data plane which includes implicit trust zones, subject/system, and Policy Enforcement Points. FREE ACCESS
  • Locked
    5.  Deception Technologies
    3m 38s
    After completing this video, you will be able to compare deception technologies such as honeypots, honeynets, honeyfiles, and honeytokens. FREE ACCESS
  • Locked
    6.  Preventative Physical Security Controls
    7m 13s
    Upon completion of this video, you will be able to define preventative physical security controls like bollards, access control vestibule, access badges/cards, fencing, gates, mantraps, and security guards. FREE ACCESS
  • Locked
    7.  Detective Physical Security Controls
    4m 55s
    After completing this video, you will be able to outline detective physical security controls like video surveillance, lighting, and infrared, pressure, microwave, and ultrasonic sensors. FREE ACCESS
  • Locked
    8.  Change Management Business Processes
    3m 55s
    Upon completion of this video, you will be able to outline change management business processes including approval, ownership, stakeholders, impact analysis, test results, backout plan, maintenance window, and standard operating procedures. FREE ACCESS
  • Locked
    9.  Change Management Technical Implications
    1m 44s
    After completing this video, you will be able to define change management technical implications like allow lists, deny lists, restricted activities, downtime, service restart, application restart, legacy applications, and dependencies. FREE ACCESS
  • Locked
    10.  Documentation and Version Control
    2m 16s
    Upon completion of this video, you will be able to understand the importance of comprehensive documentation and version control. FREE ACCESS
  • Locked
    11.  Course Summary
    40s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 80 users Rating 4.6 of 80 users (80)
Rating 4.6 of 22 users Rating 4.6 of 22 users (22)
Rating 4.7 of 3 users Rating 4.7 of 3 users (3)