CompTIA CASP+: Storage & Network Security

CompTIA CASP+    |    Intermediate
  • 16 videos | 1h 47m 4s
  • Includes Assessment
  • Earns a Badge
Likes 26 Likes 26
On-premises and cloud-based storage security solutions are very similar in nature. In this course, you'll learn how to determine which RAID disk solution best applies in a given situation, as well as how to secure various network storage solutions and DNS. Next, you'll learn to recognize when to apply firewalls to secure networks and how to configure various firewall solutions. Moving on, you'll explore how to configure a VPN and secure wired and wireless networks. Lastly, you'll examine how to manage servers through a jump box and how attackers enable reverse shells. This course is one of a collection of courses that prepares learners for the CompTIA Advanced Security Practitioner (CASP+) CAS-004 exam.


  • discover the key concepts covered in this course
    differentiate between RAID levels
    configure software RAID using Windows Server
    configure software RAID using Ubuntu Linux
    identify various types of network storage solutions
    apply hardening techniques to DNS
    identify different types of firewalls
    configure the Azure Firewall
  • configure firewall settings on a Windows host
    recognize how VPNs secure remote network traffic
    configure a point-to-site VPN for the Azure cloud
    summarize wired network security concerns
    summarize wireless network security concerns
    use an Azure Bastion host as a jump box for server management
    establish a reverse shell using netcat
    summarize the key concepts covered in this course


  • 1m 35s
    Here, you’ll learn more about your instructor and this course. In this course, you’ll learn how to determine which RAID disk solution best applies in a given situation. You’ll also learn how to secure various network storage solutions and DNS. Next, you’ll learn how to recognize when to apply firewalls to secure networks and how to configure various firewall solutions. You’ll then configure a VPN and learn how to secure wired and wireless networks. FREE ACCESS
  • 6m 34s
    Here, you’ll learn about RAID. RAID stands for Redundant Array of Inexpensive Disks, or Redundant Array of Independent Disks. Here, you’ll learn the purpose of RAID and how it's related to security and data availability. With RAID, you have a group of physical disks that work together. This can improve performance and availability. FREE ACCESS
  • Locked
    3.  Enabling Software RAID in Windows
    8m 12s
    Here, you’ll learn how to enable software RAID in Windows. This software enhances the performance or fault tolerance. This is the resiliency of a disk subsystem, using software instead of a hardware RAID controller. You might have multiple disks working together as one logical disk, as it's seen by the operating system. What you’ll do here is configure software RAID in Windows Server. FREE ACCESS
  • Locked
    4.  Enabling Software RAID in Linux
    7m 24s
    Here, you’ll learn how to enable software RAID in Ubuntu Linux. Software RAID is not preferred as hardware because hardware RAID uses a circuit board designed to work with multiple disks and have them work together. It's considered more resilient, more stable, and robust than software RAID. However, software RAID is the next best thing to use to increase disk performance or data availability in the absence of a hardware RAID controller. FREE ACCESS
  • Locked
    5.  Network Storage
    8m 13s
    Here, you’ll learn more about network storage. Data is by far the most important asset in a computing environment. This means you must think about storage security. With network storage, you have centralized storage that's accessible by multiple devices. It allows for backups in a central location that you can secure, perhaps by encrypting or storing copies of it in other locations. The files themselves can be called binary large objects or BLOBS. FREE ACCESS
  • Locked
    6.  Securing DNS
    6m 18s
    Here, you’ll learn more about securing DNS. You can secure DNS in a number of ways, one of which is using DNS over HTTPS, otherwise called DoH. Instead of clients sending DNS requests to DNS servers in clear text, it would encrypt it and send it over HTTPS. This uses the standard HTTPS port 443. You can also enable DNSSEC or DNS Security. FREE ACCESS
  • Locked
    7.  Firewalls
    8m 8s
    You’ll learn more about firewalls. Firewalls can restrict traffic coming into or out of a network, a host on the network, or an application running on a host. The placement of the firewall is important. Perimeter firewalls are important around the network's edge, but so are individual host-based firewalls on all devices. There are a number of different types of firewalls you can work with. You’ll take a look at each of these. FREE ACCESS
  • Locked
    8.  Deploying Azure Firewall
    11m 39s
    Here, you’ll learn how to deploy Azure firewall. There are many different types of firewall implementations, and they're all important in restricting the flow of traffic to where it should be going. In Microsoft Azure, you’ll configure the Azure firewall. Here, you’ll use it as a standard packet filtering type of firewall. First, you’ll take a look at your existing virtual network configuration in your cloud environment. FREE ACCESS
  • Locked
    9.  Managing the Windows Defender Firewall
    7m 35s
    Here, you’ll learn to manage the Windows Defender firewall. It’s important to make sure you have firewalls running on each individual host and that they're configured accordingly. Ideally, everything's blocked, aside from the exceptions you've added to allow traffic into or out of the host. In your Windows Server, you’ll configure firewall settings using Windows Defender.   FREE ACCESS
  • Locked
    10.  Virtual Private Networks
    6m 8s
    Here, you’ll learn more about VPNs. A Virtual Private Network or VPN provides remote access to a private network. It's an end-to-end point connection, which might allow users to work from home and access corporate resources. A VPN uses an encrypted network tunnel between two endpoints. What you’ll end up with is encryption of data in transit. There are a number of different types of VPN protocols. FREE ACCESS
  • Locked
    11.  Configuring Cloud VPN Connectivity
    8m 6s
    In this demonstration, you’ll be configuring VPN client connectivity to the Microsoft Azure cloud. In Azure, you’ll see the VPN appliance side of things via a virtual-private-gateway type of configuration. Now, you’ll make sure you can get the client connected through PKI certificate authentication. One way to do that is to generate your own self-signed root certificate, which you’ll do through PowerShell. FREE ACCESS
  • Locked
    12.  Wired Network Security
    9m 2s
    Here, you’ll learn about wired network security. There are many ways to harden a wired network environment. One of these is to use air-gapped networks. In some cases, you might have mission-critical services running on a network. Because of the sensitivity of those networks, you might want to make sure they are not physically connected to any other network that would allow connectivity to or from the internet, hence air-gapped networks. FREE ACCESS
  • Locked
    13.  Wireless Network Security
    7m 27s
    Here, you’ll learn about wireless network security. The Zigbee network protocol is used for IoT home automation, which requires wireless connectivity. It doesn't use IP addresses. It protects transmissions over the network using AES 128-bit encryption. This is another short-range wireless technology where devices need to be paired together to communicate.   FREE ACCESS
  • Locked
    14.  Managing Servers through a Jump Box
    4m 16s
    Here, you’ll learn how to manage servers through a jump box. When you deploy virtual machines into the cloud, you won’t make them exposed publicly via a public IP address. Ideally, those virtual machines would have only private IP addresses. They would go through a jump box host to gain access to remotely manage those hosts with private IPs. In Azure, that jump box solution is called Azure Bastion. FREE ACCESS
  • Locked
    15.  Using Netcat to Establish a Reverse Shell
    5m 13s
    Here, you’ll learn how to use NetCat to establish a reverse shell. Fooling victims into clicking links or downloading and running file attachments is one way social engineering tricks people into infecting their machines with malware. One form of that type of malware is setting up a reverse shell. A reverse shell allows a victim machine that's been infected with malware to make an outbound connection to the attacker station. FREE ACCESS
  • Locked
    16.  Course Summary
    1m 16s
    Here, you’ll summarize what you’ve learned in the course. You’ve learned how to apply RAID levels and network storage solutions, where appropriate. You also learned to configure firewall rules, enable VPNs, and recognize how to secure wired and wireless networks. You explored Redundant Array of Inexpensive Disks and enabled software RAID in Windows and Linux. You examined network storage and learned how to secure DNS. Finally, you examined firewalls and deployed Azure Firewall. FREE ACCESS


Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.