Course description
Are you ready to learn about enterprise storage security? How about host security? This course will dive into the protocols for enterprise storage as well as the types of storage available, even in your small business or home office. We will examine the various methods of storage management and how to replicate data to allow for fault tolerance and disaster recovery. After discussing storage, we will focus on host security with an emphasis on anti-malware, host-based firewalls, and more. This course is part of a series covering the CompTIA Advanced Security Practitioner (CASP).
Prerequisites
This course assumes that you have familiarity with information technology, basic networking, and basic security concepts. No scripting or “hacking” experience is required. Having windows command line experience as well as having administrative rights on your machine will be helpful.
Learning Paths
This course will help you prepare for the following certification and exam:
CompTIA Advanced Security
CAS-002: CompTIA Advanced Security Practitioner
Meet the expert
David Bigger is the lead trainer at Bigger IT Solutions. He has been information technology for a little over 20 years and has been training all over the US. He has worked with companies like US Military, Lockheed Martin, General Dynamics, Dominos Pizza, University of Utah and Expedia
Course outline
Enterprise Storage and Security
Intro to Enterprise Storage (14:45)
- Introduction (00:28)
- Intro to Enterprise Storage (02:02)
- Types of Enterprise Storage (03:07)
- NAS Protocols (01:20)
- What Can Go Wrong with a NAS? (02:16)
- SAN (01:28)
- What Can Go Wrong with a SAN? (01:29)
- vSAN (01:07)
- What Can Go Wrong with a vSAN? (00:58)
- Summary (00:28)
Enterprise Storage Protocol (09:36)
- Introduction (00:27)
- Protocol for ES (00:44)
- iSCSI (02:20)
- Fibre Channel (02:23)
- FCoE (01:08)
- Any Issues with FCoE? (02:06)
- Summary (00:24)
Enterprise Storage Management (19:34)
- Introduction (00:26)
- Management of ES (02:43)
- Deduplication (01:26)
- Snapshots (01:38)
- Dynamic Disk Pools (00:59)
- HBA (01:05)
- LUN Mapping (00:48)
- LUN Masking (00:42)
- Replication (04:57)
- Encryption in Enterprise Storage (04:26)
- Summary (00:19)
Host Firewalls (17:39)
- Introduction (00:31)
- Host Security (00:35)
- Host Based Firewalls (07:24)
- Demo: Windows Firewall Rule (04:57)
- Demo: Rule Creation (03:46)
- Summary (00:22)
Anti-Malware (25:51)
- Introduction (00:29)
- Anti-Malware (12:36)
- Beyond Anti-Virus/Malware (06:23)
- Demo: Command Line Tools (05:55)
- Summary (00:25)
Hardening (35:51)
- Introduction (00:26)
- Hardening (00:39)
- Hardening Your System (05:20)
- Trusted OS (01:44)
- End Point Security (02:51)
- Patch Management and HIDS (03:06)
- Data Loss Prevention (01:43)
- Log Monitoring (01:56)
- UEFI (01:49)
- Secure Boot (01:14)
- Encryption for Our Hosts (02:37)
- TPM (00:56)
- HSM (01:33)
- Services (02:26)
- Demo: Services (02:20)
- Demo: Disable Service (04:41)
- Summary (00:22)