Course Details

Previous Page


CompTIA Cybersecurity Analyst+ CS0-001: Reducing Vulnerabilities


Overview/Description
Target Audience
Prerequisites
Expected Duration
Lesson Objectives
Course Number



Overview/Description
Authentication controls who gets access to resources. Stronger authentication means greater control over resource access. In this course, you will identify weaknesses including conducting vulnerability scans in order to protect IT assets.

Target Audience
IT specialists who will be responsible for securing and analyzing IT assets at the hardware and software levels

Prerequisites
None

Expected Duration (hours)
2.4

Lesson Objectives

CompTIA Cybersecurity Analyst+ CS0-001: Reducing Vulnerabilities

  • start the course
  • recognize how crypto is used to secure data in the enterprise
  • differentiate symmetric from asymmetric encryption
  • differentiate asymmetric from symmetric encryption
  • identify the PKI hierarchy
  • request a security certificate from a CA
  • encrypt files on a Windows system using EFS
  • explain how file integrity can be maintained
  • enable file integrity using Linux
  • enable file integrity using Windows
  • recognize authentication methods used to prove one's identity
  • require VPN connections to use MFA
  • recognize how resource access gets authorized
  • configure centralized authentication using RADIUS
  • describe what user provisioning entails
  • describe how identity federation differs from traditional authentication
  • identify security weaknesses in server OSs
  • identify security weaknesses on endpoint devices
  • identify security weaknesses at the network level
  • identify security weaknesses on mobile devices
  • recognize the overall process of scanning for vulnerabilities
  • configure appropriate vulnerability scanning settings
  • explain how the SCAP standard is used to measure vulnerability issues and compliance
  • conduct a vulnerability scan using Nessus
  • distinguish various vulnerability scanning tools from one another
  • conduct a vulnerability scan using MBSA
  • understand vulnerability scan results
  • put controls in place to mitigate threats
  • reduce vulnerabilities that can be exploited
  • Course Number:
    cs_cybs_a04_it_enus