Systems Hardening
Cybersecurity
| Beginner
- 24 videos | 1h 4m 2s
- Includes Assessment
- Earns a Badge
Security hardening is the process of securing systems and networks by reducing the surface of vulnerability. In this course, you'll learn the types of systems that can be hardened as well as how security baselines can be used to define normal conditions on a network. Explore how Group Policy can be used to apply computer settings to numerous systems at once, and discover the benefits of performing ongoing security patching. Explore steps used to harden systems by role including: client, server, database, web server, FTP, DNS, DHCP, network, and mobile devices. Lastly, learn how to differentiate between free and commercial hardening tools, recognize steps to properly implement authentication, authorization, and accounting, and implement physical security to contribute to overall security stability. This course was originally created by Global Knowledge (GK).
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseProvide an overview of security hardeningList the types of systems that can and should be hardenedDescribe how security baselines can be used to define normal conditions on a networkRecognize steps used to harden computer systemsProvide an overview of system servicesDescribe how group policy can be used to apply computer settings to numerous systems at onceRecognize the benefits of performing ongoing security patchingRecognize security patching considerations from an organization standpointList considerations when hardening systems by roleDescribe how to harden servers in an organizationRecognize steps used to harden databases
-
Perform directory services hardeningDescribe how to perform domain name system (dns) hardeningPerform dynamic host configuration protocol (dhcp) hardeningRecognize how to harden web serversDescribe steps used to harden file transfer protocol (ftp) serversDescribe how to harden client systems such as an end-user pcProvide an overview of mobile device hardeningProvide an overview of mobile device management solutionsRecognize how to perform hardening on a networkDifferentiate between free and commercial hardening toolsRecognize steps to properly implement authentication, authorization, and accountingDescribe how physical security can ensure overall security stability
IN THIS COURSE
-
34s
-
2m 1s
-
1m 29s
-
2m 3s
-
1m 40s
-
2m 8s
-
1m 36s
-
3m 48s
-
2m 22s
-
18s
-
1m 44s
-
1m 30s
-
1m 12s
-
1m 50s
-
4m 14s
-
3m 57s
-
5m 27s
-
1m 37s
-
6m 44s
-
4m 9s
-
4m 53s
-
3m 37s
-
1m 35s
-
3m 32s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.