Integrating Security Controls for Host Devices

CASP+ 2018    |    Expert
  • 11 videos | 40m 24s
  • Includes Assessment
  • Earns a Badge
Rating 4.3 of 9 users Rating 4.3 of 9 users (9)
Discover enterprise security architecture and examine integration of security controls for host devices to meet security requirements. In this course, you will learn how to implement trusted operating systems, explain least functionality, and describe endpoint security software. You will then review host-based IDS and IPS, and see how to harden host systems, wireless peripherals, and physical host peripherals. You will also examine scripting and replication, boot loader programs, terminal services, and application delivery services. Finally, you will see how to integrate controls for host devices.

WHAT YOU WILL LEARN

  • Implement trusted operating systems
    Define least functionality
    Describe endpoint security software
    Describe host-based ids and ips
    Harden host systems
    Define scripting and replication
  • Harden wireless peripherals
    Secure physical host peripherals
    Protect the boot loader programs
    Describe terminal services and application delivery services
    Describe integrating controls for host devices

IN THIS COURSE

  • 3m 56s
    In this video, you will learn how to implement trusted operating systems. FREE ACCESS
  • 3m 17s
    Learn how to define the least amount of functionality. FREE ACCESS
  • Locked
    3.  Endpoint Security Software
    4m 15s
    Upon completion of this video, you will be able to describe endpoint security software. FREE ACCESS
  • Locked
    4.  Host-based IDS and IPS
    5m 35s
    Upon completion of this video, you will be able to describe host-based intrusion detection systems and intrusion prevention systems. FREE ACCESS
  • Locked
    5.  Hardening Hosts
    5m 54s
    Find out how to harden host systems. FREE ACCESS
  • Locked
    6.  Scripting and Replication
    3m 35s
    In this video, you will learn how to define scripting and replication. FREE ACCESS
  • Locked
    7.  Hardening Wireless Host Peripherals
    4m 8s
    During this video, you will learn how to harden wireless peripherals. FREE ACCESS
  • Locked
    8.  Securing Physical Host Peripherals
    2m 56s
    Find out how to secure physical host peripherals. FREE ACCESS
  • Locked
    9.  Boot Loader Protections
    2m 44s
    Find out how to protect boot loader programs. FREE ACCESS
  • Locked
    10.  Terminal Services and Application Delivery Services
    2m 42s
    After completing this video, you will be able to describe terminal services and application delivery services. FREE ACCESS
  • Locked
    11.  Exercise: Describe Integrating Controls for Devices
    1m 23s
    Upon completion of this video, you will be able to describe how to integrate controls for host devices. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.7 of 16 users Rating 4.7 of 16 users (16)
Rating 4.6 of 123 users Rating 4.6 of 123 users (123)
Rating 4.8 of 16 users Rating 4.8 of 16 users (16)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.7 of 20 users Rating 4.7 of 20 users (20)
Rating 4.7 of 198 users Rating 4.7 of 198 users (198)
Rating 4.7 of 220 users Rating 4.7 of 220 users (220)