CompTIA Security+: Wireless, Mobile, & Embedded Device Security
CompTIA Security+
| Intermediate
- 14 Videos | 54m 23s
- Includes Assessment
- Earns a Badge
This domain encompasses one of the most rapidly changing and evolving sets of technologies. It also represents one of the most significant changes from the previous Security+ exam. In this CompTIA Security+ SY0-601 course, you'll explore a broad range of communication solutions based on the fundamental aspects of wireless, mobile, and embedded system technology security. You'll learn about a variety of specialized systems and concepts, including wireless cryptographic and authentication protocols, wireless security methods and installation, mobile connection methods and receivers, device types and deployment models, MDM and MAM, mobility enforcement and monitoring, and various embedded and specialized systems. By gaining knowledge in these areas, you will be prepared for a career in the world's most cutting-edge industries. This course can be used in preparation for the CompTIA Security+ SY0-601 certification exam.
WHAT YOU WILL LEARN
-
discover the key concepts covered in this coursedescribe cryptographic and authentication protocols for wireless, like WPA2, WPA3, CCMP, SAE, EAP, PEAP, EAP-FAST, EAP-TLS, and EAP-TTLSsurvey wireless security methods such as PSK vs. enterprise vs. open, WPS, and captive portalsdescribe installation considerations, as in site surveys, heat maps, Wi-Fi analysis, channel overlays, and WAP placementcompare various mobile connection methods and receivers, such as cellular, WiFi, Bluetooth, NFC, infrared, USB, RFID, and GPSdescribe mobile device types, like MicroSD HSM and SEAndroiddefine mobile deployment models, as in BYOD, COPE, CYOD, corporate-owned, and VDI
-
describe mobile device management concepts like MDM vs. MAM, content management, remote wipe, geofencing, geolocation, screen locks, push notifications, passwords, pins, and biometricssurvey mobile enforcement and monitoring concepts, such as third-party app stores, rooting, jailbreaking, sideloading, custom firmware, carrier unlocking, and firmware OTA updatesdescribe embedded system security, such as in raspberry pi, FPGA, and Arduino, and constraints such as power, compute, network, crypto, inability to patch, authentication, range, cost, and implied trustdefine SCADA security issues such as facilities, industrial, manufacturing, energy, and logisticscompare IoT security like sensors, smart devices, facility automation, specialized systems, medical systems, vehicles, aircraft, and smart metersdescribe specialty systems like VoIP, HVAC, drones, AVs, MFP, RTOS, surveillance systems, SoC, 5g, narrow-band, baseband radio, and SIM cardssummarize the key concepts covered in this course
IN THIS COURSE
-
1.Course Overview1m 55sUP NEXT
-
2.Wireless Cryptographic and Authentication Protocols7m 20s
-
3.Wireless Security Methods3m 31s
-
4.Wireless Installation Considerations4m 17s
-
5.Mobile Connection Methods and Receivers6m 34s
-
6.Mobile Device Types1m 39s
-
7.Mobile Deployment Models2m 38s
-
8.Mobile Device Management (MDM)7m 51s
-
9.Mobile Enforcement and Monitoring4m 52s
-
10.Embedded System Security and Constraints3m 54s
-
11.SCADA Security1m 55s
-
12.Internet of Things (IoT)2m 21s
-
13.Securing Specialized Systems4m 50s
-
14.Course Summary48s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.