IT Security comprises many different areas and organizations that need skilled IT security personnel who understand the tools and technologies required to architect, deploy, maintain, and troubleshoot the infrastructure required to keep a company's data secure. In this course, Technologies and Tools for CompTIA Security+, you'll learn the networking components (hardware and software) required to maintain organizational security. First, you'll explore the concepts required to troubleshoot and remediate issues. Next, you'll discover the tools required to properly assess a company's security posture, including network scanners, protocol analyzers, vulnerability scanning, and exploitation frameworks. Finally, you'll learn the infrastructure and security concerns dealing with mobile device deployment, including the protocols, devices, and infrastructure needed to secure a company's assets. By the end of this course, you'll understand the various technologies and tools required to assess a company's security posture, identify gaps in their defenses, and recommend solutions to mitigate those risks.
Chris is a lifelong learner and professional information technologist, trainer and IT Manager. Married with 3 children, Chris is interested in martial arts, working out, spending time with family and friends and being creative whenever possible.
Course Overview Hey everyone, my name is Christopher Rees and welcome to my course, Technologies and Tools for CompTIA Security+. So in addition to being a trainer here at Pluralsight, I'm also a former law enforcement officer who specialized in computer crimes and I have over 20 years of enterprise IT experience. I've also been training the students from all over the world since 1998. So in this course, we'll cover the various technologies and tools associated with supporting, assessing, monitoring and also troubleshooting a company's security infrastructure as well as a company's overall security posture. So, some of the major topics that we'll cover include, security infrastructure required to secure a company's assets, such as firewalls, VPNs, VPN concentrators, network intrusion detection and also intrusion prevention systems, also basic networking concepts such as router switches, load balances and so forth. We'll also talk about the tools you use to assess a company's security posture, so protocol and network analysers, password crackers, data sanitization tools and so on. We'll also cover troubleshooting security issues, securing mobile devices and various connection methods. Lastly, we'll cover implementing secure protocols. So by the end of the course, you'll know the key concepts and technologies required to assess, monitor, manage and also, troubleshoot a secure environment for your company, no matter how big or how small or what industry. But before beginning the course, having some exposure to CompTIA's A+ or Network+ concepts is helpful, but not a requirement and from here, you should feel comfortable diving into some advanced security topics with courses such as, CompTIA Advanced Security Practitioner and also, Malware Analysis: The Big Picture. So I hope you'll join me on this journey to learn technologies and tools with the technologies and tools for CompTIA Security+ course, here at Pluralsight.
Analyzing and Interpreting Output from Security Technologies Hello and welcome back to Pluralsight. I'm your instructor, Christopher Rees. And in this module we will be covering analyzing and interpreting output from security technologies. So in this module we have a few things to cover. Let's talk about host-based intrusion detection and intrusion prevention systems. We'll talk about antivirus, file integrity checks, host-based firewalls. Now some of these things we've talked about before in a grander sense, now we're talking about host-based versions. We'll also talk about application whitelisting, removable media control, advanced malware tools, Also talk about patch management tools, UTM or unified threat management tools, which are kind of a "catch-all" the "Swiss army knife" if you will they kind of do a little bit of everything. We'll talk about DLP or data loss prevention. Also data execution prevention and then web application firewalls. So let's go ahead and get started.
Implementing Secure Protocols Hey, welcome back to Pluralsight. I'm your instructor Christopher Rees and in this module, we're going to be covering implementing secure protocols. Let's go ahead and start off, before we even get into the meat of the module, let's talk about why should we even care? Secure protocols ensure communication is safe from hackers and also from prying eyes. So we think about it, all the communication that we do all day long, email, instant messages, connecting to servers other laptops, different services, applications and so forth, all of that communication both with internet work and also leaving our network and coming into the network. All of those things should be secure whenever possible so that we avoid what? We avoid prying eyes, hackers and ultimately data breaches, so as I'm sure you understand, it's critical to securing your company's data, intellectual property, competitive advantage and so forth. If we have a data breach, it can have a very significant impact, as I mentioned before, to a company's bottom line. It can obviously impact revenue, but it can also impact reputation. It can impact brand, brand awareness, consumer confidence, investor confidence, If in fact that intellectual property or some distinct competitive advantage is leaked or stolen from the network, some type of breach occurs and that information is exfiltrated or removed from the network, given to a competitor, it can have an impact great enough to actually put a company out of business. So it's critically important that we understand where security can be tightened up, what protocols exist, and where secure protocol or secure alternatives exist to make sure that we're locking these things down as much as possible. So let's go ahead and get started.