Implementation of Secure Solutions for CompTIA Security+
This course will teach you the fundamentals and key concepts around secure protocols, hardware and software technologies, and various use cases to illustrate how they function to keep a company’s assets and data secure.
What you'll learn
In this course, you’ll learn about the various ways you can secure your company’s systems, network and data using secure protocols, hardware and software. First, you’ll learn about secure protocols and their various use cases. Next, you’ll learn about the hardware that helps harden a company’s security posture including endpoint protection, encryption mechanisms, database and application security, and network access control. Next, you’ll learn about securing WiFi and mobile solutions, along with protecting data in the cloud. Lastly, you’ll learn about authentication and public key infrastructure. When you’ve finished the course, you’ll have the knowledge necessary to pass the Implementation domain of the CompTIA Security+ exam as well as the skills required to secure your company’s data both on-prem and in the cloud.
Table of contents
- Module Overview 1m
- Antivirus 1m
- Endpoint Detection and Response (EDR) 2m
- Data Loss Prevention (DLP) 2m
- Next-generation Firewall (NGFW) 2m
- HIDS/HIPS 1m
- Host-based Firewall 1m
- Boot Loader Protections and Secure Boot 3m
- Measured Launch 1m
- Integrity Measurement Architecture (IMA) 0m
- BIOS/UEFI 1m
- Hashing 2m
- Salt 1m
- Secure Coding Techniques 6m
- Code Quality and Testing 3m
- Static Code Analysis 2m
- Fuzzing 4m
- Additional Secure Coding Concepts 2m
- Peripherals Security 2m
- Hardening the Environment 2m
- Common Ports 1m
- Registry Hardening 2m
- Self-encrypting Drives (SED) 2m
- Hardware Root of Trust 1m
- Hardware Based Encryption 3m
- Sandboxing 2m
- Module Overview 1m
- Load Balancers 4m
- Security Segmentation Models 3m
- Virtualization 1m
- Air Gaps 2m
- East-west Traffic 2m
- Zero Trust 2m
- VPN 4m
- Split Tunnel 1m
- IPSec and Transport Encryption 2m
- VPN Concentrator 1m
- DNSSEC 4m
- Network Access Control (NAC) 3m
- In-band vs. Out-of-band Management 4m
- Port Security and 802.1x 4m
- Loop Protection and Flood Guards 2m
- Spanning Tree Protocol (STP) 3m
- DHCP Snooping 1m
- MAC Filtering 2m
- Module Review 0m
- Module Overview 1m
- Jump Server 2m
- Proxies 4m
- Web Security Gateways 2m
- Intrusion Detection and Prevention 6m
- IDS/IPS Component Workflow 1m
- Four Approaches to IDS 2m
- Network-based IDS 2m
- Security Device Placement 2m
- Firewalls 6m
- Web Application Firewalls 2m
- Unified Threat Management (UTM) 1m
- Content Filters 1m
- Implicit Deny and ACLs 1m
- Route Security 2m
- Quality of Service (QoS) 2m
- Implications of IPv6 2m
- Port Mirroring, Port Spanning, and Port Taps 3m
- File Integrity Check 2m
- Module Review 1m
- Module Review 1m
- Wireless Definitions 2m
- WEP/WPA/WPA2 1m
- WPA and WPA2 Security 4m
- WPA3 4m
- Wireless Security Examples 2m
- Wireless Security and Pen Testing Tools 3m
- EAP, PEAP, and LEAP 2m
- 802.11x Wireless Protocols 2m
- RADIUS Federation 0m
- Wi-Fi Protected Setup (WPS) 1m
- Captive Portal 2m
- Installation Considerations 1m
- Access Points/Wi-Fi Security 4m
- Band Selection/Width 2m
- Fat vs. Thin Access Points and Stand-alone vs. Controller-based 3m
- Module Review 0m
- Module Overview 1m
- Cellular 7m
- Securing Wi-Fi 2m
- Near Field Communication (NFC) 1m
- Additional Areas of Concern 2m
- MicroSD HSM 1m
- Mobile Device Management (MDM, MAM, and UEM) 1m
- SEAndroid 1m
- Device Security 4m
- Application Security and Key Credential Management 3m
- Authentication 2m
- Geo-tagging 2m
- Context-aware Authentication 2m
- Enforcement and Monitoring 4m
- BYOD Concerns and Deployment Models 4m
- Additional BYOD Concerns 3m
- Module Review 0m
- Module Intro 1m
- High Availability 2m
- Resource Policies 1m
- Secrets Management 2m
- Storage in the Cloud 3m
- Virtual Networks 3m
- API Inspection and Integration 2m
- Growth of Enterprise Cloud Application 1m
- Cyber Kill Chain in the Cloud 4m
- Compute in the Cloud 4m
- Cloud Access Security Broker (CASB) 1m
- Application Security 1m
- Next-gen Secure Web Gateway (NG-SWG) 1m
- Firewall Considerations in a Cloud Environment 2m
- TCP/IP and OSI Models 1m
- Application Layer, Protocol Layer, and Volumetric Attacks 2m
- Cost 1m
- Cloud Native Controls vs. Third-party Solutions 3m
- Module Review 0m
- Identity Provider (IdP) 1m
- IdP Example 2m
- Certificates, Tokens, and SSH Keys 1m
- Certificate Issues 3m
- Smart Cards 1m
- User Accounts 1m
- Account Management 2m
- Password Complexity 1m
- Password History 2m
- Password Reuse 1m
- Time of Day Restrictions 1m
- User Access Best Practices 2m
- Permissions Auditing and Review 1m
- Recertification 2m
- Group Policy 2m
- Expiration 2m
- Recovery 2m
- Impossible Travel/Risky Login 2m
- Lockout 1m
- Disablement 1m
- Module Review 0m
- Module Overview 1m
- Authentication Management 3m
- Extensible Authentication Protocol (EAP) 1m
- Challenge Handshake Authentication Protocol (CHAP) 1m
- Password Authentication Protocol (PAP) 1m
- Port Security and 802.1x Authentication 4m
- RADIUS 3m
- Single Sign-on (SSO) 1m
- SAML 2m
- TACACS 1m
- TACACS+ 2m
- oAUTH 2m
- OpenID and Shibboleth 1m
- Kerberos 4m
- Attribute Based Access Control (ABAC) 3m
- Rule-based/Role-based Access Control (RBAC) 2m
- Access Control Methods 1m
- Mandatory Access Control (MAC) 1m
- Discretionary Access Control (DAC) 1m
- Conditional Access 1m
- Privileged Accounts 1m
- Filesystem Permissions 1m
- Module Overview 1m
- Certificate Authorities and Digital Certificates 1m
- Certificate Authority 2m
- CRLs 1m
- OCSP 2m
- CSR and PKCS Standards 1m
- PKI 4m
- Public Key 1m
- Private Key 1m
- Object Identifiers (OID) 2m
- Types of Certificates 5m
- Certificate Formats 1m
- Online vs. Offline Certificate Authority (CA) 2m
- Stapling and Pinning 1m
- Trust Models 2m
- Key Escrow 1m
- Certificate Chaining 1m