Device Hardening

Pluralsight is not an official partner or accredited training center of EC-Council. Reducing the attack surface is important to secure the enterprise. This course provides insight as to how IT systems can be hardened to protect digital IT assets.
Course info
Level
Beginner
Updated
Sep 26, 2017
Duration
2h 29m
Table of contents
Description
Course info
Level
Beginner
Updated
Sep 26, 2017
Duration
2h 29m
Description

Pluralsight is not an official partner or accredited training center of EC-Council. Hardening ensures IT systems comply with organizational security guidelines. In this course, Device Hardening, you'll acquire skills that will let you secure your IT environment. First, you'll explore how hardening applies to a wide variety of computing solutions. Next, you'll learn how to apply security requirements to harden network devices and hosts. Finally, you'll discover how to secure virtualization environments and application servers. When you're finished with this course, you'll have the skills and knowledge needed to properly harden your IT ecosystem. Software required: Microsoft Windows Server 2016, System Center Configuration Manager 2016, Red Hat Enterprise Linux 7.1, Amazon Web Services, and Microsoft Azure.

About the author
About the author

Daniel Lachance, CompTIA Security+, CompTIA A+®, CompTIA Network+®, CompTIA Server+, CompTIA Cloud Essentials, MCITP, MCTS, MCSA, is the owner of Lachance IT Consulting Inc. He is the author of the CompTIA Server+ Certification All-in-One Exam Guide, CompTIA Cloud Essentials Certification Study Guide, and co-author of CompTIA Security+ Certification Practice Exams.

More from the author
Managing Microsoft Azure Subscriptions
Beginner
2h 8s
Jun 11, 2020
More courses by Daniel Lachance
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
Hi everyone, I'm Dan Lachance. Welcome to my course, Device Hardening. Organizations develop security policies to protect their employees, their assets, and their business processes. Hardening consists of configuration steps that result in a reduced attack surface. Whether we apply these settings manually, or whether they're deployed centrally, there are common solutions for hardening all IT systems, but at the same time there are specific IT configurations that improve the organization's security stance for certain types of systems. Some of the major topics that we will talk about include defining the meaning and scope of hardening, techniques used to harden network devices and hosts, and also techniques used to harden virtualization environments and application servers. By the end of this course, you'll understand how to not only harden a variety of IT systems, but also how to ensure compliance over time. I hope you'll join me to learn about hardening your IT environment within the Device Hardening course here at Pluralsight.