Technologies and Tools for CompTIA Security+
IT Security is one of the fastest-growing and most in-demand skillsets in IT. This course focuses on the tools and technologies required to deploy and troubleshoot a company's security infrastructure.
What you'll learn
IT Security comprises many different areas and organizations that need skilled IT security personnel who understand the tools and technologies required to architect, deploy, maintain, and troubleshoot the infrastructure required to keep a company's data secure. In this course, Technologies and Tools for CompTIA Security+, you'll learn the networking components (hardware and software) required to maintain organizational security. First, you'll explore the concepts required to troubleshoot and remediate issues. Next, you'll discover the tools required to properly assess a company's security posture, including network scanners, protocol analyzers, vulnerability scanning, and exploitation frameworks. Finally, you'll learn the infrastructure and security concerns dealing with mobile device deployment, including the protocols, devices, and infrastructure needed to secure a company's assets. By the end of this course, you'll understand the various technologies and tools required to assess a company's security posture, identify gaps in their defenses, and recommend solutions to mitigate those risks.
Table of contents
- Module Intro 4m
- TCP/IP and OSI Models 2m
- Firewalls 6m
- Application Firewall 2m
- VPN 4m
- Transport Encryption 2m
- Intrusion Detection and Prevention 6m
- IDS Component Workflow 1m
- Four Approaches to IDS 2m
- Network Based IDS 2m
- Reacting to Alerts/issues 3m
- Routers 3m
- Switches 2m
- Layer 2 vs. Layer 3 1m
- Load Balancers 1m
- Load Balancer Terms 3m
- Web Security Gateways 2m
- Port Security 4m
- Loop Protection and Flood Controls 2m
- Data Loss Prevention (DLP) 2m
- Spanning Tree Protocol (STP) 3m
- Access Points/WiFi Security 4m
- Security Information and Event Management (SIEM) 3m
- Network Access Control (NAC) 3m
- Hardware Based Encryption 2m
- Mail Gateway 1m
- Additional Things to Consider 2m
- Module Overview and Interpreting the Results 3m
- Protocol Analyzers 1m
- Network Scanners 2m
- Implicit Deny 1m
- Split Tunnel 1m
- Rogue Machine Detection 1m
- Port Scanner 1m
- In-Band vs. Out-of-Band 4m
- Wireless Scanners 1m
- False Positives 2m
- Vulnerability Scanner 2m
- Proxies 4m
- Exploitation Frameworks 2m
- Bandwidth Selection / Width 2m
- Data Sanitization Tools 5m
- Fat vs. Thin Access Points 3m
- Steganography 2m
- Honeypots 2m
- Backup Utilities 2m
- Banner Grabbing 1m
- Passive vs. Active Tools 1m
- Command Line Tools 4m
- Module Intro/why Should You Care? 3m
- Unencrypted Credentials 2m
- Log and Event Anomalies 2m
- Configuration Compliance Scanners 1m
- Access Violations 2m
- Certificate Issues/certificate Hierarchy 3m
- Mis-configured Devices 1m
- Weak Security Configurations 1m
- Personnel Issues 5m
- Unauthorized Software 2m
- Baseline Deviation 5m
- Asset Management 1m
- Authentication Issues 2m
- Module Intro and Cellular Risks 7m
- Securing WiFi 2m
- Near Field Communication (NFC) 1m
- Additional Areas of Concern (SATCOM, Bluetooth, Infrared) 2m
- Device Security 4m
- Application Security and Key/credential Management 3m
- Authentication 2m
- Geo-tagging 2m
- Context-aware Authentication 2m
- Enforcement and Monitoring 4m
- BYOD Concerns and Deployment Models 4m
- Additional BYOD Concerns 3m
- Module Review 1m