CompTIA Security+ (2014 Objectives) prepares networking and IT professionals with the knowledge and skills required to identify risk, to participate in risk mitigation activities, and to provide infrastructure, application, information, and operational security. In addition, the successful candidate will be given the skills to be able to accurately apply security controls to maintain confidentiality, integrity, and availability, identify appropriate technologies and products, and troubleshoot security events and incidents.
Chris is a lifelong learner and professional information technologist, trainer and IT Manager. Married with 3 children, Chris is interested in martial arts, working out, spending time with family and friends and being creative whenever possible.
Getting Started Hello and welcome to Pluralsight. My name is Christopher Rees and I am your instructor for the CompTIA Security+ course. Let's go ahead and get started and see what we're going to look at today.
Secure Network Administration Principles Hi welcome to Pluralsight and this module on Secure Network Administration Principles. In this module we're going to cover a number of things, so I'm going to print out the list here for you in a moment, don't worry it's not as bad as it seems. Alright, we have a lot of things to cover here, but what I'm going to do is break it into sections because some of these concepts kind of logically lump together. For instance, ruled-based management, firewall rules, implicit deny, secure router configuration, and ACLs, access control lists, are going to deal with securing the flow of traffic. Then we're going to have securing and separating network segments, that's going to be covered by VLAN management and network separation. Then we're going to deal with securing the physical access to the network and that deals with port security and 802. 1x, and then we're going to talk about ensuring the availability of the network and that deals with flood guards and loop protection. And then we'll look at proactive review and analysis of security logs dealing with log analysis and UTM or unified threat management.