CompTIA Security+: Implementing Secure Protocols & Application Security Solutions

CompTIA    |    Intermediate
  • 11 videos | 48m 32s
  • Includes Assessment
  • Earns a Badge
Rating 4.4 of 134 users Rating 4.4 of 134 users (134)
In this CompTIA Security+ SY0-601 course, you'll explore a variety of core secure protocols. You'll examine Domain Name System Security Extension (DNSSEC), SSH, Secure/Multipurpose Internet Mail Exchanger (S/MIME), Secure Real-time Protocol (SRTP), LDAPS, File Transfer Protocol Secure (FTPS), Secured File Transfer Protocol (SFTP), Simple Network Management Protocol version 3 (SNMPv3), Hypertext Transfer Protocol over SSL/TLS (HTTPS), IPsec, Authentication Header (AH), and Encapsulated Security Payload (ESP) and its tunnel/transport modes. You'll move on to list several use cases for these concepts. You'll then describe endpoint protection, boot integrity mechanisms, database security mechanisms, and hardening targets. Finally, you'll identify several advanced application security techniques. This course can be used in preparation for the CompTIA Security+ SY0-601 certification exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Describe an array of secure protocols including dnssec, ssh, s/mime, srtp, ldaps, ftps, sftp, and snmpv3
    Describe ipsec in terms of authentication header (ah), encapsulated security payload (esp), and tunnel vs. transport mode
    List various use cases which include voice and video, time synchronization, email, web, file transfer, directory services, and remote access
    Describe endpoint protection in terms of antivirus, anti-malware, rde, dlp, next-generation firewalls, hids, and hips
    Outline boot integrity mechanisms such as boot security/unified extensible firmware interface (uefi), measured boot, and boot attestation
  • Recognize specific database security mechanisms like tokenization, salting, and hashing
    Define various application security measures like input validations, secure cookies, code signing, whitelisting, and blacklisting
    Describe hardening targets like open ports and services, registry, disk encryption, and patch management
    Identify advanced application security techniques like self-encrypting drives (sed), full-disk encryption (fde), opal, hardware root of trust, trusted platform module (tpm), and sandboxing
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 39s
  • 13m 25s
    Upon completion of this video, you will be able to describe an array of secure protocols including DNSSEC, SSH, S/MIME, SRTP, LDAPS, FTPS, SFTP, and SNMPv3. FREE ACCESS
  • Locked
    3.  Features of IPsec
    5m 24s
    After completing this video, you will be able to describe IPsec in terms of the Authentication Header (AH), the Encapsulated Security Payload (ESP), and tunnel vs. transport mode. FREE ACCESS
  • Locked
    4.  Types of Use Cases
    2m 23s
    Upon completion of this video, you will be able to list various use cases which include voice and video, time synchronization, email, web, file transfer, directory services, and remote access. FREE ACCESS
  • Locked
    5.  Endpoint Protection
    11m 21s
    Upon completion of this video, you will be able to describe endpoint protection in terms of antivirus, anti-malware, remote device encryption, data loss prevention, next-generation firewalls, host-based intrusion detection systems, and host-based intrusion prevention systems. FREE ACCESS
  • Locked
    6.  Boot Integrity
    1m 35s
    Learn how to outline boot integrity mechanisms such as boot security/Unified Extensible Firmware Interface (UEFI), measured boot, and boot attestation. FREE ACCESS
  • Locked
    7.  Database Security
    2m 33s
    After completing this video, you will be able to recognize specific database security mechanisms, like tokenization, salting, and hashing. FREE ACCESS
  • Locked
    8.  Application Security
    4m 48s
    Find out how to define various application security measures like input validations, secure cookies, code signing, whitelisting, and blacklisting. FREE ACCESS
  • Locked
    9.  Hardening Concepts
    1m 20s
    Upon completion of this video, you will be able to describe hardening targets such as open ports and services, registry, disk encryption, and patch management. FREE ACCESS
  • Locked
    10.  Advanced Application Security Techniques
    3m 22s
    Learn how to identify advanced application security techniques like self-encrypting drives (SED), full-disk encryption (FDE), Opal, hardware root of trust, Trusted Platform Module (TPM), and sandboxing. FREE ACCESS
  • Locked
    11.  Course Summary
    42s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.4 of 5 users Rating 4.4 of 5 users (5)
Rating 4.6 of 30 users Rating 4.6 of 30 users (30)
Rating 4.5 of 19 users Rating 4.5 of 19 users (19)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.2 of 180 users Rating 4.2 of 180 users (180)
Rating 4.4 of 108 users Rating 4.4 of 108 users (108)
Rating 4.4 of 108 users Rating 4.4 of 108 users (108)