Systems Hardening
Cybersecurity
| Beginner
- 24 Videos | 1h 4m 2s
- Includes Assessment
- Earns a Badge
Security hardening is the process of securing systems and networks by reducing the surface of vulnerability. In this course, you'll learn the types of systems that can be hardened as well as how security baselines can be used to define normal conditions on a network. Explore how Group Policy can be used to apply computer settings to numerous systems at once, and discover the benefits of performing ongoing security patching. Explore steps used to harden systems by role including: client, server, database, web server, FTP, DNS, DHCP, network, and mobile devices. Lastly, learn how to differentiate between free and commercial hardening tools, recognize steps to properly implement authentication, authorization, and accounting, and implement physical security to contribute to overall security stability. This course was originally created by Global Knowledge (GK).
WHAT YOU WILL LEARN
-
discover the key concepts covered in this courseprovide an overview of security hardeninglist the types of systems that can and should be hardeneddescribe how security baselines can be used to define normal conditions on a networkrecognize steps used to harden computer systemsprovide an overview of system servicesdescribe how Group Policy can be used to apply computer settings to numerous systems at oncerecognize the benefits of performing ongoing security patchingrecognize security patching considerations from an organization standpointlist considerations when hardening systems by roledescribe how to harden servers in an organizationrecognize steps used to harden databases
-
perform directory services hardeningdescribe how to perform Domain Name System (DNS) hardeningperform Dynamic Host Configuration Protocol (DHCP) hardeningrecognize how to harden web serversdescribe steps used to harden File Transfer Protocol (FTP) serversdescribe how to harden client systems such as an end-user PCprovide an overview of mobile device hardeningprovide an overview of mobile device management solutionsrecognize how to perform hardening on a networkdifferentiate between free and commercial hardening toolsrecognize steps to properly implement authentication, authorization, and accountingdescribe how physical security can ensure overall security stability
IN THIS COURSE
-
1.Introduction to Systems Hardening34sUP NEXT
-
2.Security Hardening2m 1s
-
3.Security Hardening Practices1m 29s
-
4.Security Baselines2m 3s
-
5.System Hardening Considerations1m 40s
-
6.System Services2m 8s
-
7.Group Policy Management1m 36s
-
8.Security Patching3m 48s
-
9.Security Patch Management2m 22s
-
10.Hardening Systems by Role18s
-
11.Server Hardening1m 44s
-
12.Database Hardening1m 30s
-
13.Directory Services Hardening1m 12s
-
14.Domain Name System Hardening1m 50s
-
15.Dynamic Host Configuration Protocol Hardening4m 14s
-
16.Web Server Hardening3m 57s
-
17.FTP Server Hardening5m 27s
-
18.Client Hardening1m 37s
-
19.Mobile Device Hardening6m 44s
-
20.Mobile Device Management4m 9s
-
21.Network Hardening4m 53s
-
22.Security Hardening Analysis Tools3m 37s
-
23.Authentication, Authorization, and Accounting1m 35s
-
24.Physical Security Considerations3m 32s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.