CompTIA Security+: Fundamental Security Concepts
CompTIA Security+
| Beginner
- 11 videos | 33m 43s
- Includes Assessment
- Earns a Badge
The Security+ candidate must display competency in an assortment of core security concepts including the newer Zero Trust initiative and common physical security controls. In this course, the learner will explore gap analysis, Zero Trust control and data planes, deception technologies like honeynets, physical security controls, Change Management business processes and technical implications, and documentation and version control. This course is part of a series that prepares you for the CompTIA Security+ (SY0-701) exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseOutline the use of gap analysis in the context of securityProvide an overview of the zero trust control plane including adaptive identity, threat scope reduction, policy-driven access control, and policy administratorProvide an overview of the zero trust data plane which includes implicit trust zones, subject/system, and policy enforcement pointsCompare deception technologies such as honeypots, honeynets, honeyfiles, and honeytokensDefine preventative physical security controls like bollards, access control vestibule, access badges/cards, fencing, gates, mantraps, and security guards
-
Outline detective physical security controls like video surveillance, lighting, and infrared, pressure, microwave, and ultrasonic sensorsOutline change management business processes including approval, ownership, stakeholders, impact analysis, test results, backout plan, maintenance window, and standard operating proceduresDefine change management technical implications like allow lists, deny lists, restricted activities, downtime, service restart, application restart, legacy applications, and dependenciesUnderstand the importance of comprehensive documentation and version controlSummarize the key concepts covered in this course
IN THIS COURSE
-
36sIn this video, we will discover the key concepts covered in this course. FREE ACCESS
-
2m 20sUpon completion of this video, you will be able to outline the use of gap analysis in the context of security. FREE ACCESS
-
4m 37sAfter completing this video, you will be able to provide an overview of the Zero Trust control plane including adaptive identity, threat scope reduction, policy-driven access control, and Policy Administrator. FREE ACCESS
-
1m 49sUpon completion of this video, you will be able to provide an overview of the Zero Trust data plane which includes implicit trust zones, subject/system, and Policy Enforcement Points. FREE ACCESS
-
3m 38sAfter completing this video, you will be able to compare deception technologies such as honeypots, honeynets, honeyfiles, and honeytokens. FREE ACCESS
-
7m 13sUpon completion of this video, you will be able to define preventative physical security controls like bollards, access control vestibule, access badges/cards, fencing, gates, mantraps, and security guards. FREE ACCESS
-
4m 55sAfter completing this video, you will be able to outline detective physical security controls like video surveillance, lighting, and infrared, pressure, microwave, and ultrasonic sensors. FREE ACCESS
-
3m 55sUpon completion of this video, you will be able to outline change management business processes including approval, ownership, stakeholders, impact analysis, test results, backout plan, maintenance window, and standard operating procedures. FREE ACCESS
-
1m 44sAfter completing this video, you will be able to define change management technical implications like allow lists, deny lists, restricted activities, downtime, service restart, application restart, legacy applications, and dependencies. FREE ACCESS
-
2m 16sUpon completion of this video, you will be able to understand the importance of comprehensive documentation and version control. FREE ACCESS
-
40sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.