CompTIA Security+: Enterprise Security Capabilities

CompTIA Security+    |    Beginner
  • 13 videos | 53m 36s
  • Includes Assessment
  • Earns a Badge
This course is a vital exploration of many of the day-to-day operational controls that the security professional is often involved with. This is what is referred to as the "due care" aspect of the job or ongoing continual maintenance. In other words, these are core "blue team" responsibilities. Topics presented to the learner include firewalls, intrusion detection system (IDS)/intrusion prevention system (IPS), web filtering, operating system security, implementing secure protocols, DNS filtering, email security, DomainKeys Identified Mail (DKIM), Sender Policy Framework (SPF), gateways, File Integrity Monitoring (FIM), data loss prevention (DLP), network access control (NAC), endpoint detection and response (EDR), Extended Detection and Response (XDR), and user behavior analytics (UBA). This course is part of a series that prepares you for the CompTIA Security+ (SY0-701) exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Review various firewall implementations like rule-based, access lists, ports and protocols, and screened subnets
    Compare intrusion detection to intrusion prevention services
    Outline the use of web filters, including agent-based, centralized proxies, url scanning, content categorization, block rules, and reputation filtering
    Provide an overview of operating system security like group policy and selinux
    Outline how to implement secure protocols, including protocol selection, port selection, and transport method
    Provide an overview of dns filtering, including dnssec and opendns solutions
  • Outline the use of email security mechanisms like domain-based message authentication reporting and conformance (dmarc), domainkeys identified mail (dkim), sender policy framework (spf), and gateways
    Provide an overview of file integrity monitoring
    Outline data loss prevention initiatives and solutions
    Provide an overview of network access (or admission) control (nac)
    Outline the use of endpoint detection and response (edr) solutions, including extended detection and response (xdr) and user behavior analytics (uba)
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 41s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 7m 55s
    In this video, we will review various firewall implementations like rule-based, access lists, ports and protocols, and screened subnets. FREE ACCESS
  • Locked
    3.  Intrusion Detection and Prevention Systems (IDS and IPS)
    5m 34s
    After completing this video, you will be able to compare intrusion detection to intrusion prevention services. FREE ACCESS
  • Locked
    4.  Web Filters
    3m 32s
    Upon completion of this video, you will be able to outline the use of web filters, including agent-based, centralized proxies, URL scanning, content categorization, block rules, and reputation filtering. FREE ACCESS
  • Locked
    5.  Operating System Security
    5m 24s
    After completing this video, you will be able to provide an overview of operating system security like group policy and SELinux. FREE ACCESS
  • Locked
    6.  Security Protocol Implementation
    3m 53s
    Upon completion of this video, you will be able to outline how to implement secure protocols, including protocol selection, port selection, and transport method. FREE ACCESS
  • Locked
    7.  DNS Filtering
    5m 2s
    After completing this video, you will be able to provide an overview of DNS filtering, including DNSSEC and OpenDNS solutions. FREE ACCESS
  • Locked
    8.  Email Security
    7m 15s
    Upon completion of this video, you will be able to outline the use of email security mechanisms like Domain-based Message Authentication Reporting and Conformance (DMARC), DomainKeys Identified Mail (DKIM), Sender Policy Framework (SPF), and gateways. FREE ACCESS
  • Locked
    9.  File Integrity Monitoring (FIM)
    2m 14s
    After completing this video, you will be able to provide an overview of file integrity monitoring. FREE ACCESS
  • Locked
    10.  Data Loss Prevention (DLP)
    3m 7s
    Upon completion of this video, you will be able to outline data loss prevention initiatives and solutions. FREE ACCESS
  • Locked
    11.  Network Access Control (NAC)
    5m 9s
    After completing this video, you will be able to provide an overview of network access (or admission) control (NAC). FREE ACCESS
  • Locked
    12.  Endpoint Detection and Response
    3m 12s
    Upon completion of this video, you will be able to outline the use of endpoint detection and response (EDR) solutions, including extended detection and response (XDR) and user behavior analytics (UBA). FREE ACCESS
  • Locked
    13.  Course Summary
    40s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 123 users Rating 4.6 of 123 users (123)
Rating 5.0 of 4 users Rating 5.0 of 4 users (4)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)