Integrating Security Controls for Host Devices
CASP+ 2018
| Expert
- 11 Videos | 40m 24s
- Includes Assessment
- Earns a Badge
Discover enterprise security architecture and examine integration of security controls for host devices to meet security requirements. In this course, you will learn how to implement trusted operating systems, explain least functionality, and describe endpoint security software. You will then review host-based IDS and IPS, and see how to harden host systems, wireless peripherals, and physical host peripherals. You will also examine scripting and replication, boot loader programs, terminal services, and application delivery services. Finally, you will see how to integrate controls for host devices.
WHAT YOU WILL LEARN
-
implement trusted operating systemsdefine least functionalitydescribe endpoint security softwaredescribe host-based IDS and IPSharden host systemsdefine scripting and replication
-
harden wireless peripheralssecure physical host peripheralsprotect the boot loader programsdescribe terminal services and application delivery servicesdescribe integrating controls for host devices
IN THIS COURSE
-
1.Implementing Trusted OSs3m 56sUP NEXT
-
2.Least Functionality3m 17s
-
3.Endpoint Security Software4m 15s
-
4.Host-based IDS and IPS5m 35s
-
5.Hardening Hosts5m 54s
-
6.Scripting and Replication3m 35s
-
7.Hardening Wireless Host Peripherals4m 8s
-
8.Securing Physical Host Peripherals2m 56s
-
9.Boot Loader Protections2m 44s
-
10.Terminal Services and Application Delivery Services2m 42s
-
11.Exercise: Describe Integrating Controls for Devices1m 23s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.