Companies Home Search Profile

Implementation of Secure Solutions for CompTIA Security+

Focused View

Christopher Rees

6:12:43

97 View
  • 1. Course Overview.mp4
    01:54
  • 01. Module Intro.mp4
    00:49
  • 02. Networking Protocols and TCP Three-way Handshake.mp4
    03:43
  • 03. DNSSEC.mp4
    03:47
  • 04. SSH.mp4
    01:16
  • 05. SMIME.mp4
    01:01
  • 06. Secure Real-Time Transport Protocol (SRTP).mp4
    00:41
  • 07. Lightweight Directory Access Protocol over SSL (LDAPS).mp4
    00:57
  • 08. FTPS and SFTP.mp4
    01:34
  • 09. SNMP v3.mp4
    01:14
  • 10. SSLTLS.mp4
    01:01
  • 11. HTTPS.mp4
    01:27
  • 12. Secure POPIMAP.mp4
    02:52
  • 13. Use Cases.mp4
    04:12
  • 14. Module Review.mp4
    01:02
  • 01. Module Overview.mp4
    00:42
  • 02. Antivirus.mp4
    01:15
  • 03. Endpoint Detection and Response (EDR).mp4
    02:09
  • 04. Data Loss Prevention (DLP).mp4
    02:23
  • 05. Next-generation Firewall (NGFW).mp4
    01:41
  • 06. HIDSHIPS.mp4
    00:58
  • 07. Host-based Firewall.mp4
    01:29
  • 08. Boot Loader Protections and Secure Boot.mp4
    02:30
  • 09. Measured Launch.mp4
    00:39
  • 10. Integrity Measurement Architecture (IMA).mp4
    00:29
  • 11. BIOSUEFI.mp4
    00:35
  • 12. Hashing.mp4
    02:11
  • 13. Salt.mp4
    01:06
  • 14. Secure Coding Techniques.mp4
    06:27
  • 15. Code Quality and Testing.mp4
    02:46
  • 16. Static Code Analysis.mp4
    02:08
  • 17. Fuzzing.mp4
    03:35
  • 18. Additional Secure Coding Concepts.mp4
    01:54
  • 19. Peripherals Security.mp4
    02:23
  • 20. Hardening the Environment.mp4
    02:25
  • 21. Common Ports.mp4
    01:11
  • 22. Registry Hardening.mp4
    01:31
  • 23. Self-encrypting Drives (SED).mp4
    02:10
  • 24. Hardware Root of Trust.mp4
    01:13
  • 25. Hardware Based Encryption.mp4
    02:46
  • 26. Sandboxing.mp4
    02:04
  • 01. Module Overview.mp4
    00:47
  • 02. Load Balancers.mp4
    04:12
  • 03. Security Segmentation Models.mp4
    02:49
  • 04. Virtualization.mp4
    01:14
  • 05. Air Gaps.mp4
    02:03
  • 06. East-west Traffic.mp4
    01:51
  • 07. Zero Trust.mp4
    01:43
  • 08. VPN.mp4
    04:09
  • 09. Split Tunnel.mp4
    00:48
  • 10. IPSec and Transport Encryption.mp4
    01:30
  • 11. VPN Concentrator.mp4
    01:03
  • 12. DNSSEC.mp4
    03:46
  • 13. Network Access Control (NAC).mp4
    02:34
  • 14. In-band vs. Out-of-band Management.mp4
    03:57
  • 15. Port Security and 802.1x.mp4
    04:01
  • 16. Loop Protection and Flood Guards.mp4
    02:06
  • 17. Spanning Tree Protocol (STP).mp4
    02:40
  • 18. DHCP Snooping.mp4
    01:04
  • 19. MAC Filtering.mp4
    01:55
  • 20. Module Review.mp4
    00:26
  • 01. Module Overview.mp4
    00:43
  • 02. Jump Server.mp4
    02:00
  • 03. Proxies.mp4
    03:36
  • 04. Web Security Gateways.mp4
    01:47
  • 05. Intrusion Detection and Prevention.mp4
    05:52
  • 06. IDSIPS Component Workflow.mp4
    01:18
  • 07. Four Approaches to IDS.mp4
    01:53
  • 08. Network-based IDS.mp4
    02:08
  • 09. Security Device Placement.mp4
    02:25
  • 10. Firewalls.mp4
    06:19
  • 11. Web Application Firewalls.mp4
    02:12
  • 12. Unified Threat Management (UTM).mp4
    01:01
  • 13. Content Filters.mp4
    01:01
  • 14. Implicit Deny and ACLs.mp4
    00:39
  • 15. Route Security.mp4
    01:35
  • 16. Quality of Service (QoS).mp4
    01:46
  • 17. Implications of IPv6.mp4
    02:19
  • 18. Port Mirroring, Port Spanning, and Port Taps.mp4
    03:05
  • 20. Module Review.mp4
    00:31
  • 01. Module Review.mp4
    00:36
  • 02. Wireless Definitions.mp4
    01:57
  • 03. WEPWPAWPA2.mp4
    01:26
  • 04. WPA and WPA2 Security.mp4
    03:49
  • 05. WPA3.mp4
    04:08
  • 06. Wireless Security Examples.mp4
    01:53
  • 07. Wireless Security and Pen Testing Tools.mp4
    02:31
  • 08. EAP, PEAP, and LEAP.mp4
    02:20
  • 09. 802.11x Wireless Protocols.mp4
    02:20
  • 10. RADIUS Federation.mp4
    00:26
  • 11. Wi-Fi Protected Setup (WPS).mp4
    00:56
  • 12. Captive Portal.mp4
    02:05
  • 13. Installation Considerations.mp4
    01:06
  • 14. Access PointsWi-Fi Security.mp4
    03:40
  • 15. Band SelectionWidth.mp4
    01:51
  • 16. Fat vs. Thin Access Points and Stand-alone vs. Controller-based.mp4
    02:54
  • 17. Module Review.mp4
    00:29
  • 01. Module Overview.mp4
    00:32
  • 02. Cellular.mp4
    07:15
  • 03. Securing Wi-Fi.mp4
    01:36
  • 04. Near Field Communication (NFC).mp4
    01:17
  • 05. Additional Areas of Concern.mp4
    02:25
  • 06. MicroSD HSM.mp4
    00:53
  • 07. Mobile Device Management (MDM, MAM, and UEM).mp4
    01:15
  • 08. SEAndroid.mp4
    01:05
  • 09. Device Security.mp4
    04:02
  • 10. Application Security and Key Credential Management.mp4
    02:54
  • 11. Authentication.mp4
    01:47
  • 12. Geo-tagging.mp4
    01:30
  • 13. Context-aware Authentication.mp4
    02:04
  • 14. Enforcement and Monitoring.mp4
    04:23
  • 15. BYOD Concerns and Deployment Models.mp4
    03:40
  • 16. Additional BYOD Concerns.mp4
    02:47
  • 17. Module Review.mp4
    00:23
  • 01. Module Intro.mp4
    00:41
  • 02. High Availability.mp4
    02:10
  • 03. Resource Policies.mp4
    01:17
  • 04. Secrets Management.mp4
    02:19
  • 05. Storage in the Cloud.mp4
    02:49
  • 06. Virtual Networks.mp4
    02:39
  • 07. API Inspection and Integration.mp4
    01:34
  • 08. Growth of Enterprise Cloud Application.mp4
    01:29
  • 09. Cyber Kill Chain in the Cloud.mp4
    03:53
  • 10. Compute in the Cloud.mp4
    03:40
  • 11. Cloud Access Security Broker (CASB).mp4
    00:55
  • 12. Application Security.mp4
    01:03
  • 13. Next-gen Secure Web Gateway (NG-SWG).mp4
    00:46
  • 14. Firewall Considerations in a Cloud Environment.mp4
    01:56
  • 15. TCPIP and OSI Models.mp4
    00:38
  • 16. Application Layer, Protocol Layer, and Volumetric Attacks.mp4
    02:05
  • 17. Cost.mp4
    01:13
  • 18. Cloud Native Controls vs. Third-party Solutions.mp4
    02:51
  • 01. Module Review.mp4
    00:28
  • 02. Identity Provider (IdP).mp4
    01:27
  • 03. IdP Example.mp4
    01:44
  • 04. Certificates, Tokens, and SSH Keys.mp4
    01:29
  • 05. Certificate Issues.mp4
    02:47
  • 06. Smart Cards.mp4
    00:55
  • 07. User Accounts.mp4
    00:59
  • 08. Account Management.mp4
    01:58
  • 09. Password Complexity.mp4
    01:18
  • 10. Password History.mp4
    01:49
  • 11. Password Reuse.mp4
    01:17
  • 12. Time of Day Restrictions.mp4
    00:54
  • 13. User Access Best Practices.mp4
    02:25
  • 14. Permissions Auditing and Review.mp4
    01:13
  • 15. Recertification.mp4
    01:44
  • 16. Group Policy.mp4
    02:17
  • 17. Expiration.mp4
    02:28
  • 18. Recovery.mp4
    01:38
  • 19. Impossible TravelRisky Login.mp4
    02:22
  • 20. Lockout.mp4
    00:43
  • 21. Disablement.mp4
    00:49
  • 22. Module Review.mp4
    00:28
  • 01. Module Overview.mp4
    00:46
  • 02. Authentication Management.mp4
    03:05
  • 03. Extensible Authentication Protocol (EAP).mp4
    00:48
  • 04. Challenge Handshake Authentication Protocol (CHAP).mp4
    00:58
  • 05. Password Authentication Protocol (PAP).mp4
    00:54
  • 06. Port Security and 802.1x Authentication.mp4
    04:01
  • 07. RADIUS.mp4
    02:40
  • 08. Single Sign-on (SSO).mp4
    01:21
  • 09. SAML.mp4
    02:16
  • 10. TACACS.mp4
    01:11
  • 11. TACACS+.mp4
    02:07
  • 12. oAUTH.mp4
    01:56
  • 13. OpenID and Shibboleth.mp4
    01:24
  • 14. Kerberos.mp4
    03:36
  • 15. Attribute Based Access Control (ABAC).mp4
    02:52
  • 16. Rule-basedRole-based Access Control (RBAC).mp4
    01:36
  • 17. Access Control Methods.mp4
    01:12
  • 18. Mandatory Access Control (MAC).mp4
    01:01
  • 19. Discretionary Access Control (DAC).mp4
    00:45
  • 20. Conditional Access.mp4
    01:11
  • 21. Privileged Accounts.mp4
    01:04
  • 22. Filesystem Permissions.mp4
    01:29
  • 01. Module Overview.mp4
    00:35
  • 02. Certificate Authorities and Digital Certificates.mp4
    00:51
  • 03. Certificate Authority.mp4
    01:54
  • 04. CRLs.mp4
    01:29
  • 05. OCSP.mp4
    01:51
  • 06. CSR and PKCS Standards.mp4
    00:47
  • 07. PKI.mp4
    03:54
  • 08. Public Key.mp4
    01:10
  • 09. Private Key.mp4
    00:39
  • 10. Object Identifiers (OID).mp4
    01:52
  • 11. Types of Certificates.mp4
    05:07
  • 12. Certificate Formats.mp4
    01:04
  • 13. Online vs. Offline Certificate Authority (CA).mp4
    01:57
  • 14. Stapling and Pinning.mp4
    00:52
  • 15. Trust Models.mp4
    01:45
  • 16. Key Escrow.mp4
    01:17
  • 17. Certificate Chaining.mp4
    01:03
  • Description


    This course will teach you the fundamentals and key concepts around secure protocols, hardware and software technologies, and various use cases to illustrate how they function to keep a company’s assets and data secure.

    What You'll Learn?


      In this course, you’ll learn about the various ways you can secure your company’s systems, network and data using secure protocols, hardware and software. First, you’ll learn about secure protocols and their various use cases. Next, you’ll learn about the hardware that helps harden a company’s security posture including endpoint protection, encryption mechanisms, database and application security, and network access control. Next, you’ll learn about securing WiFi and mobile solutions, along with protecting data in the cloud. Lastly, you’ll learn about authentication and public key infrastructure. When you’ve finished the course, you’ll have the knowledge necessary to pass the Implementation domain of the CompTIA Security+ exam as well as the skills required to secure your company’s data both on-prem and in the cloud.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Christopher Rees
    Christopher Rees
    Instructor's Courses
    Chris is a professional information technologist, trainer, manager and lifelong learner. He is married with 3 beautiful children and interested in martial arts, working out, spending time with family and friends and being creative whenever possible. He has created a number of IT Certification training courses over the past 10 years and really enjoys helping people advance their careers through training and personal development.
    Pluralsight, LLC is an American privately held online education company that offers a variety of video training courses for software developers, IT administrators, and creative professionals through its website. Founded in 2004 by Aaron Skonnard, Keith Brown, Fritz Onion, and Bill Williams, the company has its headquarters in Farmington, Utah. As of July 2018, it uses more than 1,400 subject-matter experts as authors, and offers more than 7,000 courses in its catalog. Since first moving its courses online in 2007, the company has expanded, developing a full enterprise platform, and adding skills assessment modules.
    • language english
    • Training sessions 193
    • duration 6:12:43
    • level preliminary
    • English subtitles has
    • Release Date 2023/02/07