Systems Hardening

Cybersecurity    |    Beginner
  • 24 Videos | 1h 6m 32s
  • Includes Assessment
  • Earns a Badge
Security hardening is the process of securing systems and networks by reducing the surface of vulnerability. In this course, you'll learn the types of systems that can be hardened as well as how security baselines can be used to define normal conditions on a network. Explore how Group Policy can be used to apply computer settings to numerous systems at once, and discover the benefits of performing ongoing security patching. Explore steps used to harden systems by role including: client, server, database, web server, FTP, DNS, DHCP, network, and mobile devices. Lastly, learn how to differentiate between free and commercial hardening tools, recognize steps to properly implement authentication, authorization, and accounting, and implement physical security to contribute to overall security stability.

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    provide an overview of security hardening
    list the types of systems that can and should be hardened
    describe how security baselines can be used to define normal conditions on a network
    recognize steps used to harden computer systems
    provide an overview of system services
    describe how Group Policy can be used to apply computer settings to numerous systems at once
    recognize the benefits of performing ongoing security patching
    recognize security patching considerations from an organization standpoint
    list considerations when hardening systems by role
    describe how to harden servers in an organization
    recognize steps used to harden databases
  • perform directory services hardening
    describe how to perform Domain Name System (DNS) hardening
    perform Dynamic Host Configuration Protocol (DHCP) hardening
    recognize how to harden web servers
    describe steps used to harden File Transfer Protocol (FTP) servers
    describe how to harden client systems such as an end-user PC
    provide an overview of mobile device hardening
    provide an overview of mobile device management solutions
    recognize how to perform hardening on a network
    differentiate between free and commercial hardening tools
    recognize steps to properly implement authentication, authorization, and accounting
    describe how physical security can ensure overall security stability

IN THIS COURSE