CompTIA Security+: Wireless, Mobile, & Embedded Device Security
CompTIA
| Intermediate
- 14 videos | 54m 23s
- Includes Assessment
- Earns a Badge
This domain encompasses one of the most rapidly changing and evolving sets of technologies. It also represents one of the most significant changes from the previous Security+ exam. In this CompTIA Security+ SY0-601 course, you'll explore a broad range of communication solutions based on the fundamental aspects of wireless, mobile, and embedded system technology security. You'll learn about a variety of specialized systems and concepts, including wireless cryptographic and authentication protocols, wireless security methods and installation, mobile connection methods and receivers, device types and deployment models, MDM and MAM, mobility enforcement and monitoring, and various embedded and specialized systems. By gaining knowledge in these areas, you will be prepared for a career in the world's most cutting-edge industries. This course can be used in preparation for the CompTIA Security+ SY0-601 certification exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDescribe cryptographic and authentication protocols for wireless, like wpa2, wpa3, ccmp, sae, eap, peap, eap-fast, eap-tls, and eap-ttlsSurvey wireless security methods such as psk vs. enterprise vs. open, wps, and captive portalsDescribe installation considerations, as in site surveys, heat maps, wi-fi analysis, channel overlays, and wap placementCompare various mobile connection methods and receivers, such as cellular, wifi, bluetooth, nfc, infrared, usb, rfid, and gpsDescribe mobile device types, like microsd hsm and seandroidDefine mobile deployment models, as in byod, cope, cyod, corporate-owned, and vdi
-
Describe mobile device management concepts like mdm vs. mam, content management, remote wipe, geofencing, geolocation, screen locks, push notifications, passwords, pins, and biometricsSurvey mobile enforcement and monitoring concepts, such as third-party app stores, rooting, jailbreaking, sideloading, custom firmware, carrier unlocking, and firmware ota updatesDescribe embedded system security, such as in raspberry pi, fpga, and arduino, and constraints such as power, compute, network, crypto, inability to patch, authentication, range, cost, and implied trustDefine scada security issues such as facilities, industrial, manufacturing, energy, and logisticsCompare iot security like sensors, smart devices, facility automation, specialized systems, medical systems, vehicles, aircraft, and smart metersDescribe specialty systems like voip, hvac, drones, avs, mfp, rtos, surveillance systems, soc, 5g, narrow-band, baseband radio, and sim cardsSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 55s
-
7m 20sUpon completion of this video, you will be able to describe cryptographic and authentication protocols for wireless, such as WPA2, WPA3, CCMP, SAE, EAP, PEAP, EAP-FAST, EAP-TLS, and EAP-TTLS. FREE ACCESS
-
3m 31sFind out how to survey wireless security methods such as PSK vs. enterprise vs. open, WPS, and captive portals. FREE ACCESS
-
4m 17sAfter completing this video, you will be able to describe installation considerations, such as site surveys, heat maps, Wi-Fi analysis, channel overlays, and WAP placement. FREE ACCESS
-
6m 34sIn this video, you will learn how to compare various mobile connection methods and receivers. These include cellular, WiFi, Bluetooth, NFC, infrared, USB, RFID, and GPS. FREE ACCESS
-
1m 39sAfter completing this video, you will be able to describe mobile device types, like MicroSD, HSM, and SEAndroid. FREE ACCESS
-
2m 38sIn this video, learn how to define mobile deployment models, such as BYOD, COPE, CYOD, corporate-owned, and VDI. FREE ACCESS
-
7m 51sUpon completion of this video, you will be able to describe mobile device management concepts like MDM vs. MAM, content management, remote wipe, geofencing, geolocation, screen locks, push notifications, passwords, pins, and biometrics. FREE ACCESS
-
4m 52sIn this video, you will learn how to survey mobile enforcement and monitoring concepts, such as third-party app stores, rooting, jailbreaking, sideloading, custom firmware, carrier unlocking, and firmware OTA updates. FREE ACCESS
-
3m 54sUpon completion of this video, you will be able to describe embedded system security, such as in raspberry pi, FPGA, and Arduino, and constraints such as power, compute, network, crypto, inability to patch, authentication, range, cost, and implied trust. FREE ACCESS
-
1m 55sDuring this video, you will learn how to define SCADA security issues for facilities, industrial, manufacturing, energy, and logistics. FREE ACCESS
-
2m 21sIn this video, find out how to compare the security of IoT sensors, smart devices, facility automation, specialized systems, medical systems, vehicles, aircraft, and smart meters. FREE ACCESS
-
4m 50sAfter completing this video, you will be able to describe specialty systems like VoIP, HVAC, drones, AVs, MFP, RTOS, surveillance systems, SoC, 5g, narrow-band, baseband radio, and SIM cards. FREE ACCESS
-
48s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.