CompTIA Security+: Mitigation Techniques
CompTIA Security+
| Beginner
- 10 videos | 29m 5s
- Includes Assessment
- Earns a Badge
As a security professional, it is always better to be proactive with mitigation rather than purely reactive. Begin this course by exploring segmentation and isolation, access control mechanisms, and configuration and patch management. Next, you will investigate the principles of least privilege and separation of duties and find out how encryption technologies can shield private information from unauthorized users. Then you will examine the monitoring and visibility of access controls and learn the best practices for decommissioning and offboarding. Finally, you will focus on hardening techniques, including endpoint detection and response (EDR), host intrusion detection system (HIDS)/host intrusion prevention system (HIPS), disabling ports/protocols, default password changes, and removal of unnecessary software. This course is part of a series that prepares you for the CompTIA Security+ (SY0-701) exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDescribe segmentation and isolation techniquesCompare access controls, including access control lists (acls), network access control lists (nacls), permissions, allow-lists, and cloud solution provider (csp) security groupsDefine configuration management and patch managementDefine the least privilege and separation of duties principles
-
Describe how encryption contributes to access controlCompare monitoring and visibility techniques for access controlsCompare decommissioning and offboardingDescribe hardening through encryption, endpoint detection and response (edr), host intrusion detection system (hids)/host intrusion prevention system (hips), disabling ports/protocols, default password changes, and removal of unnecessary softwareSummarize the key concepts covered in this course
IN THIS COURSE
-
34sIn this video, we will discover the key concepts covered in this course. FREE ACCESS
-
4m 50sAfter completing this video, you will be able to describe segmentation and isolation techniques. FREE ACCESS
-
6m 5sUpon completion of this video, you will be able to compare access controls, including access control lists (ACLs), network access control lists (NACLs), permissions, allow-lists, and cloud solution provider (CSP) security groups. FREE ACCESS
-
4m 15sAfter completing this video, you will be able to define configuration management and patch management. FREE ACCESS
-
3m 24sUpon completion of this video, you will be able to define the least privilege and separation of duties principles. FREE ACCESS
-
1m 9sAfter completing this video, you will be able to describe how encryption contributes to access control. FREE ACCESS
-
3m 15sUpon completion of this video, you will be able to compare monitoring and visibility techniques for access controls. FREE ACCESS
-
2m 3sAfter completing this video, you will be able to compare decommissioning and offboarding. FREE ACCESS
-
2m 56sUpon completion of this video, you will be able to describe hardening through encryption, endpoint detection and response (EDR), host intrusion detection system (HIDS)/host intrusion prevention system (HIPS), disabling ports/protocols, default password changes, and removal of unnecessary software. FREE ACCESS
-
35sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.