Course description
With an expanding array of smartphones, laptops and tablets now present in the enterprise, security expert Ryan Hendricks looks at what security and IT professionals can do to make these devices more secure. This course also examines security issues on the desktop and what’s new with firewalls and anti-virus programs. In addition to imparting insights about how to protect specific devices, Hendricks also examines the underlying concepts of identification, authentication factors and account management.
Each LearnNowOnline training course is made up of Modules (typically an hour in length). Within each module there are Topics (typically 15-30 minutes each) and Subtopics (typically 2-5 minutes each). There is a Post Exam for each Module that must be passed with a score of 70% or higher to successfully and fully complete the course.
Prerequisites
This course assumes that the user has working knowledge of networks and networking. Ideally, the user should have their CompTIA Network+ certification, but can be replaced with networking experience.
Meet the expert
Ryan Hendricks
Ryan Hendricks is an experienced instructor who teaches networking and security courses to IT professionals throughout the nation. He currently has the CompTIA Certified Technical Trainer (CTT+ Classroom) and the Cisco Certified Academy Instructor (CCAI) credentials. He holds certifications from (ISC)2, EC-Council, CompTIA, and Cisco. When not on the podium instructing, he delves into IT books, always looking to learn more and keep up with the latest security topics.
Video Runtime
166 Minutes
Time to complete
206 Minutes
Course Outline
Data Security
Mobile Devices (24:08)
- Introduction (00:23)
- Device Security (06:36)
- Device Security, Cont. (03:29)
- Application Security (05:24)
- BYOD Concerns (04:53)
- BYOD Concerns, Cont. (03:02)
- Summary (00:20)
Host Security (16:55)
- Introduction (00:21)
- OS Security and Settings (00:47)
- OS Hardening (02:02)
- Anti-Malware (02:21)
- Patch Management (01:21)
- Trusted OS (01:15)
- Host-Based Firewalls (00:59)
- Host-Based Intrusion Detection (01:44)
- Hardware Security (01:04)
- Host Software Baselining (01:06)
- Virtualization (03:26)
- Summary (00:24)
Data Security (26:25)
- Introduction (00:20)
- Cloud Storage (02:30)
- Storage Attached Network (SAN) (01:03)
- Handling Big Data (02:00)
- Data Encryption (04:52)
- Hardware Based Encryption (03:45)
- Data In-Transit (01:53)
- Data At-Rest (00:51)
- Data In-Use (01:59)
- Permissions/ACLs (01:12)
- Data Policies (05:16)
- Summary (00:38)
Environment (22:33)
- Introduction (00:27)
- Heating, Ventilation, and AC (01:59)
- Fire Suppression (02:54)
- EMI Shielding (02:18)
- Hot and Cold Isles (01:26)
- SCADA (02:17)
- Embedded (01:29)
- Android (02:33)
- Mainframe (00:52)
- Game Consoles (01:16)
- In-Vehicle Computing Systems (01:19)
- Methods (03:12)
- Summary (00:23)
Authentication
Authentication (19:24)
- Introduction (00:19)
- Identification (01:04)
- Authentication (00:40)
- Something You Know (01:09)
- Something you have (03:51)
- Something You Are (04:01)
- Biometrics (03:02)
- Additional Authentication (02:59)
- Single Factor (00:01)
- Multi-Factor (01:44)
- Summary (00:29)
Authentication Services (17:12)
- Introduction (00:21)
- RADIUS (02:40)
- TACACS (02:24)
- Kerberos (00:49)
- Kerberos Explained (04:05)
- Single Sign-On (SSO) (01:30)
- LDAP (01:18)
- Secure LDAP (00:40)
- SAML (01:21)
- Federated Identity (01:36)
- Summary (00:24)
Authorization (12:33)
- Introduction (00:20)
- Authorization? (00:51)
- Mandatory Access Control (02:25)
- MAC, Cont. (01:12)
- Discretionary Access Control (01:10)
- DAC, Cont. (00:44)
- Role-Based Access Control (01:30)
- RBAC, Cont. (00:16)
- MAC, DAC, and RBAC (01:14)
- Time of Day Restrictions (02:13)
- Summary (00:33)
Account Management (26:55)
- Introduction (00:20)
- Shared Accounts (00:00)
- Multiple Accounts (00:55)
- Account Policy Enforcement (00:35)
- Policy Enforcement, Cont. (10:03)
- Demo: Password Policy (05:15)
- Demo: More Password Policy (04:26)
- User Assigned Privileges (00:58)
- Group Based Privileges (01:00)
- User Access Reviews (01:31)
- Continuous Monitoring (01:19)
- Summary (00:27)