CISM 2022: Secure Device & OS Management

CISM    |    Intermediate
  • 16 videos | 1h 38m 37s
  • Includes Assessment
  • Earns a Badge
Rating 4.7 of 9 users Rating 4.7 of 9 users (9)
IT departments must work in conjunction with higher-level management to determine when and how to securely use technological solutions that support the business strategy. In this course, begin by exploring how mobile device usage in a business environment can introduce risk and how that risk can be managed with centralized remote wipe capabilities. Then find out how Microsoft Intune can be used to centrally manage devices and how to securely wipe a disk partition. Learn how to harden Windows computers using Group Policy and disable the deprecated SSL network security protocol on Windows hosts. Next, investigate common digital forensics hardware and software solutions, as well as the storage area network (SAN) security and jump box solutions to manage hosts securely and remotely. Finally, discover how to manage Azure resources permissions using managed identities, examine device and OS hardening techniques, and investigate the importance of firmware and software patching. This course can be used to prepare for the Certified Information Security Manager (CISM) exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Outline various methods of hardening mobile devices such as bring your own device (byod), consistent security configurations, and containerization
    Recall when and how mobile devices get remotely wiped
    Use microsoft intune to centrally manage devices
    Delete a disk partition using a wiping tool
    Apply group policy settings to secure windows stations
    Disable sslv3 on windows server
    List common digital forensic hardware and software solutions
  • List methods of securing a san
    Enable azure bastion for secure remote virtual machine (vm) management
    Enable a vm managed identity for resource access
    Describe various methods of hardening network devices and device oss
    Harden a wi-fi router
    Harden a network printer
    Identify the importance of hardware and software patches
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 27s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 8m 50s
    After completing this video, you will be able to outline various methods of hardening mobile devices such as bring your own device (BYOD), consistent security configurations, and containerization. FREE ACCESS
  • Locked
    3.  Mobile Device Remote Wipe
    5m 36s
    Upon completion of this video, you will be able to recall when and how mobile devices get remotely wiped. FREE ACCESS
  • Locked
    4.  Centrally Managing Devices
    7m 12s
    Learn how to use Microsoft Intune to centrally manage devices. FREE ACCESS
  • Locked
    5.  Securely Wiping Storage Media
    4m 56s
    In this video, find out how to delete a disk partition using a wiping tool. FREE ACCESS
  • Locked
    6.  Hardening Windows Stations Using Group Policy
    8m 44s
    Discover how to apply group policy settings to secure Windows stations. FREE ACCESS
  • Locked
    7.  Disabling SSL on Windows Servers
    5m 51s
    In this video, you will learn how to disable SSLv3 on Windows Server. FREE ACCESS
  • Locked
    8.  Digital Forensics Hardware and Software
    7m 58s
    After completing this video, you will be able to list common digital forensic hardware and software solutions. FREE ACCESS
  • Locked
    9.  Storage Area Network (SAN) Security
    7m 23s
    Upon completion of this video, you will be able to list methods of securing a SAN. FREE ACCESS
  • Locked
    10.  Implementing a Jump Box Solution
    6m 5s
    Find out how to enable Azure Bastion for secure remote virtual machine (VM) management. FREE ACCESS
  • Locked
    11.  Configuring Microsoft Azure Managed Identities
    5m 22s
    During this video, discover how to enable a VM managed identity for resource access. FREE ACCESS
  • Locked
    12.  Device and Operating System (OS) Hardening
    7m 39s
    After completing this video, you will be able to describe various methods of hardening network devices and device OSs. FREE ACCESS
  • Locked
    13.  Hardening a Wi-Fi Router
    9m 18s
    In this video, you will learn how to harden a Wi-Fi router. FREE ACCESS
  • Locked
    14.  Hardening a Network Printer
    5m 4s
    During this video, you will learn how to harden a network printer. FREE ACCESS
  • Locked
    15.  Firmware and Software Patching
    6m 1s
    Upon completion of this video, you will be able to identify the importance of hardware and software patches. FREE ACCESS
  • Locked
    16.  Course Summary
    1m 12s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 14 users Rating 4.6 of 14 users (14)
Rating 4.6 of 5 users Rating 4.6 of 5 users (5)
Rating 4.6 of 21 users Rating 4.6 of 21 users (21)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.9 of 8 users Rating 4.9 of 8 users (8)
Rating 4.7 of 7 users Rating 4.7 of 7 users (7)
Rating 4.7 of 53 users Rating 4.7 of 53 users (53)