CompTIA Security+: Wireless, Mobile, & Embedded Device Security

CompTIA Security+    |    Intermediate
  • 14 videos | 54m 23s
  • Includes Assessment
  • Earns a Badge
Likes 159 Likes 159
This domain encompasses one of the most rapidly changing and evolving sets of technologies. It also represents one of the most significant changes from the previous Security+ exam. In this CompTIA Security+ SY0-601 course, you'll explore a broad range of communication solutions based on the fundamental aspects of wireless, mobile, and embedded system technology security. You'll learn about a variety of specialized systems and concepts, including wireless cryptographic and authentication protocols, wireless security methods and installation, mobile connection methods and receivers, device types and deployment models, MDM and MAM, mobility enforcement and monitoring, and various embedded and specialized systems. By gaining knowledge in these areas, you will be prepared for a career in the world's most cutting-edge industries. This course can be used in preparation for the CompTIA Security+ SY0-601 certification exam.

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    describe cryptographic and authentication protocols for wireless, like WPA2, WPA3, CCMP, SAE, EAP, PEAP, EAP-FAST, EAP-TLS, and EAP-TTLS
    survey wireless security methods such as PSK vs. enterprise vs. open, WPS, and captive portals
    describe installation considerations, as in site surveys, heat maps, Wi-Fi analysis, channel overlays, and WAP placement
    compare various mobile connection methods and receivers, such as cellular, WiFi, Bluetooth, NFC, infrared, USB, RFID, and GPS
    describe mobile device types, like MicroSD HSM and SEAndroid
    define mobile deployment models, as in BYOD, COPE, CYOD, corporate-owned, and VDI
  • describe mobile device management concepts like MDM vs. MAM, content management, remote wipe, geofencing, geolocation, screen locks, push notifications, passwords, pins, and biometrics
    survey mobile enforcement and monitoring concepts, such as third-party app stores, rooting, jailbreaking, sideloading, custom firmware, carrier unlocking, and firmware OTA updates
    describe embedded system security, such as in raspberry pi, FPGA, and Arduino, and constraints such as power, compute, network, crypto, inability to patch, authentication, range, cost, and implied trust
    define SCADA security issues such as facilities, industrial, manufacturing, energy, and logistics
    compare IoT security like sensors, smart devices, facility automation, specialized systems, medical systems, vehicles, aircraft, and smart meters
    describe specialty systems like VoIP, HVAC, drones, AVs, MFP, RTOS, surveillance systems, SoC, 5g, narrow-band, baseband radio, and SIM cards
    summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 55s
  • 7m 20s
  • Locked
    3.  Wireless Security Methods
    3m 31s
  • Locked
    4.  Wireless Installation Considerations
    4m 17s
  • Locked
    5.  Mobile Connection Methods and Receivers
    6m 34s
  • Locked
    6.  Mobile Device Types
    1m 39s
  • Locked
    7.  Mobile Deployment Models
    2m 38s
  • Locked
    8.  Mobile Device Management (MDM)
    7m 51s
  • Locked
    9.  Mobile Enforcement and Monitoring
    4m 52s
  • Locked
    10.  Embedded System Security and Constraints
    3m 54s
  • Locked
    11.  SCADA Security
    1m 55s
  • Locked
    12.  Internet of Things (IoT)
    2m 21s
  • Locked
    13.  Securing Specialized Systems
    4m 50s
  • Locked
    14.  Course Summary
    48s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.