CompTIA Security+: Wireless, Mobile, & Embedded Device Security

CompTIA    |    Intermediate
  • 14 videos | 54m 23s
  • Includes Assessment
  • Earns a Badge
Rating 4.4 of 145 users Rating 4.4 of 145 users (145)
This domain encompasses one of the most rapidly changing and evolving sets of technologies. It also represents one of the most significant changes from the previous Security+ exam. In this CompTIA Security+ SY0-601 course, you'll explore a broad range of communication solutions based on the fundamental aspects of wireless, mobile, and embedded system technology security. You'll learn about a variety of specialized systems and concepts, including wireless cryptographic and authentication protocols, wireless security methods and installation, mobile connection methods and receivers, device types and deployment models, MDM and MAM, mobility enforcement and monitoring, and various embedded and specialized systems. By gaining knowledge in these areas, you will be prepared for a career in the world's most cutting-edge industries. This course can be used in preparation for the CompTIA Security+ SY0-601 certification exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Describe cryptographic and authentication protocols for wireless, like wpa2, wpa3, ccmp, sae, eap, peap, eap-fast, eap-tls, and eap-ttls
    Survey wireless security methods such as psk vs. enterprise vs. open, wps, and captive portals
    Describe installation considerations, as in site surveys, heat maps, wi-fi analysis, channel overlays, and wap placement
    Compare various mobile connection methods and receivers, such as cellular, wifi, bluetooth, nfc, infrared, usb, rfid, and gps
    Describe mobile device types, like microsd hsm and seandroid
    Define mobile deployment models, as in byod, cope, cyod, corporate-owned, and vdi
  • Describe mobile device management concepts like mdm vs. mam, content management, remote wipe, geofencing, geolocation, screen locks, push notifications, passwords, pins, and biometrics
    Survey mobile enforcement and monitoring concepts, such as third-party app stores, rooting, jailbreaking, sideloading, custom firmware, carrier unlocking, and firmware ota updates
    Describe embedded system security, such as in raspberry pi, fpga, and arduino, and constraints such as power, compute, network, crypto, inability to patch, authentication, range, cost, and implied trust
    Define scada security issues such as facilities, industrial, manufacturing, energy, and logistics
    Compare iot security like sensors, smart devices, facility automation, specialized systems, medical systems, vehicles, aircraft, and smart meters
    Describe specialty systems like voip, hvac, drones, avs, mfp, rtos, surveillance systems, soc, 5g, narrow-band, baseband radio, and sim cards
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 55s
  • 7m 20s
    Upon completion of this video, you will be able to describe cryptographic and authentication protocols for wireless, such as WPA2, WPA3, CCMP, SAE, EAP, PEAP, EAP-FAST, EAP-TLS, and EAP-TTLS. FREE ACCESS
  • Locked
    3.  Wireless Security Methods
    3m 31s
    Find out how to survey wireless security methods such as PSK vs. enterprise vs. open, WPS, and captive portals. FREE ACCESS
  • Locked
    4.  Wireless Installation Considerations
    4m 17s
    After completing this video, you will be able to describe installation considerations, such as site surveys, heat maps, Wi-Fi analysis, channel overlays, and WAP placement. FREE ACCESS
  • Locked
    5.  Mobile Connection Methods and Receivers
    6m 34s
    In this video, you will learn how to compare various mobile connection methods and receivers. These include cellular, WiFi, Bluetooth, NFC, infrared, USB, RFID, and GPS. FREE ACCESS
  • Locked
    6.  Mobile Device Types
    1m 39s
    After completing this video, you will be able to describe mobile device types, like MicroSD, HSM, and SEAndroid. FREE ACCESS
  • Locked
    7.  Mobile Deployment Models
    2m 38s
    In this video, learn how to define mobile deployment models, such as BYOD, COPE, CYOD, corporate-owned, and VDI. FREE ACCESS
  • Locked
    8.  Mobile Device Management (MDM)
    7m 51s
    Upon completion of this video, you will be able to describe mobile device management concepts like MDM vs. MAM, content management, remote wipe, geofencing, geolocation, screen locks, push notifications, passwords, pins, and biometrics. FREE ACCESS
  • Locked
    9.  Mobile Enforcement and Monitoring
    4m 52s
    In this video, you will learn how to survey mobile enforcement and monitoring concepts, such as third-party app stores, rooting, jailbreaking, sideloading, custom firmware, carrier unlocking, and firmware OTA updates. FREE ACCESS
  • Locked
    10.  Embedded System Security and Constraints
    3m 54s
    Upon completion of this video, you will be able to describe embedded system security, such as in raspberry pi, FPGA, and Arduino, and constraints such as power, compute, network, crypto, inability to patch, authentication, range, cost, and implied trust. FREE ACCESS
  • Locked
    11.  SCADA Security
    1m 55s
    During this video, you will learn how to define SCADA security issues for facilities, industrial, manufacturing, energy, and logistics. FREE ACCESS
  • Locked
    12.  Internet of Things (IoT)
    2m 21s
    In this video, find out how to compare the security of IoT sensors, smart devices, facility automation, specialized systems, medical systems, vehicles, aircraft, and smart meters. FREE ACCESS
  • Locked
    13.  Securing Specialized Systems
    4m 50s
    After completing this video, you will be able to describe specialty systems like VoIP, HVAC, drones, AVs, MFP, RTOS, surveillance systems, SoC, 5g, narrow-band, baseband radio, and SIM cards. FREE ACCESS
  • Locked
    14.  Course Summary
    48s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 80 users Rating 4.6 of 80 users (80)
Rating 4.5 of 33 users Rating 4.5 of 33 users (33)
Rating 4.7 of 124 users Rating 4.7 of 124 users (124)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 82 users Rating 4.5 of 82 users (82)
Rating 4.5 of 129 users Rating 4.5 of 129 users (129)
Rating 4.4 of 108 users Rating 4.4 of 108 users (108)