CompTIA Security+: Mitigation Techniques

CompTIA Security+    |    Beginner
  • 10 videos | 29m 5s
  • Includes Assessment
  • Earns a Badge
Rating 5.0 of 3 users Rating 5.0 of 3 users (3)
As a security professional, it is always better to be proactive with mitigation rather than purely reactive. Begin this course by exploring segmentation and isolation, access control mechanisms, and configuration and patch management. Next, you will investigate the principles of least privilege and separation of duties and find out how encryption technologies can shield private information from unauthorized users. Then you will examine the monitoring and visibility of access controls and learn the best practices for decommissioning and offboarding. Finally, you will focus on hardening techniques, including endpoint detection and response (EDR), host intrusion detection system (HIDS)/host intrusion prevention system (HIPS), disabling ports/protocols, default password changes, and removal of unnecessary software. This course is part of a series that prepares you for the CompTIA Security+ (SY0-701) exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Describe segmentation and isolation techniques
    Compare access controls, including access control lists (acls), network access control lists (nacls), permissions, allow-lists, and cloud solution provider (csp) security groups
    Define configuration management and patch management
    Define the least privilege and separation of duties principles
  • Describe how encryption contributes to access control
    Compare monitoring and visibility techniques for access controls
    Compare decommissioning and offboarding
    Describe hardening through encryption, endpoint detection and response (edr), host intrusion detection system (hids)/host intrusion prevention system (hips), disabling ports/protocols, default password changes, and removal of unnecessary software
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 34s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 4m 50s
    After completing this video, you will be able to describe segmentation and isolation techniques. FREE ACCESS
  • Locked
    3.  Access Control
    6m 5s
    Upon completion of this video, you will be able to compare access controls, including access control lists (ACLs), network access control lists (NACLs), permissions, allow-lists, and cloud solution provider (CSP) security groups. FREE ACCESS
  • Locked
    4.  Configuration and Patch Management
    4m 15s
    After completing this video, you will be able to define configuration management and patch management. FREE ACCESS
  • Locked
    5.  Least Privilege and Separation of Duties
    3m 24s
    Upon completion of this video, you will be able to define the least privilege and separation of duties principles. FREE ACCESS
  • Locked
    6.  Encryption in Access Control
    1m 9s
    After completing this video, you will be able to describe how encryption contributes to access control. FREE ACCESS
  • Locked
    7.  Monitoring and Visibility of Access Controls
    3m 15s
    Upon completion of this video, you will be able to compare monitoring and visibility techniques for access controls. FREE ACCESS
  • Locked
    8.  Decommissioning and Offboarding
    2m 3s
    After completing this video, you will be able to compare decommissioning and offboarding. FREE ACCESS
  • Locked
    9.  Hardening Techniques
    2m 56s
    Upon completion of this video, you will be able to describe hardening through encryption, endpoint detection and response (EDR), host intrusion detection system (HIDS)/host intrusion prevention system (HIPS), disabling ports/protocols, default password changes, and removal of unnecessary software. FREE ACCESS
  • Locked
    10.  Course Summary
    35s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.4 of 5 users Rating 4.4 of 5 users (5)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 5.0 of 2 users Rating 5.0 of 2 users (2)