Learn your way! Get started

CASP, Part 3 of 9: Enterprise Storage and Host Security

with expert David Bigger


Watch trailer


Course at a glance

Included in these subscriptions:

  • Dev & IT Pro Video
  • Dev & IT Pro Power Pack

Release date 10/4/2016
Level Beginner
Runtime 2h 3m
Closed captioning Included
Transcript Included
eBooks / courseware N/A
Hands-on labs N/A
Sample code N/A
Exams Included


Enterprise Solutions

Need reporting, custom learning tracks, or SCORM? Learn More



Course description

Are you ready to learn about enterprise storage security? How about host security? This course will dive into the protocols for enterprise storage as well as the types of storage available, even in your small business or home office. We will examine the various methods of storage management and how to replicate data to allow for fault tolerance and disaster recovery. After discussing storage, we will focus on host security with an emphasis on anti-malware, host-based firewalls, and more. This course is part of a series covering the CompTIA Advanced Security Practitioner (CASP).

Prerequisites

This course assumes that you have familiarity with information technology, basic networking, and basic security concepts. No scripting or “hacking” experience is required. Having windows command line experience as well as having administrative rights on your machine will be helpful.

Learning Paths

This course will help you prepare for the following certification and exam:
CompTIA Advanced Security
CAS-002: CompTIA Advanced Security Practitioner

Meet the expert

David Bigger is the lead trainer at Bigger IT Solutions. He has been information technology for a little over 20 years and has been training all over the US. He has worked with companies like US Military, Lockheed Martin, General Dynamics, Dominos Pizza, University of Utah and Expedia

Course outline



Enterprise Storage and Security

Intro to Enterprise Storage (14:45)
  • Introduction (00:28)
  • Intro to Enterprise Storage (02:02)
  • Types of Enterprise Storage (03:07)
  • NAS Protocols (01:20)
  • What Can Go Wrong with a NAS? (02:16)
  • SAN (01:28)
  • What Can Go Wrong with a SAN? (01:29)
  • vSAN (01:07)
  • What Can Go Wrong with a vSAN? (00:58)
  • Summary (00:28)
Enterprise Storage Protocol (09:36)
  • Introduction (00:27)
  • Protocol for ES (00:44)
  • iSCSI (02:20)
  • Fibre Channel (02:23)
  • FCoE (01:08)
  • Any Issues with FCoE? (02:06)
  • Summary (00:24)
Enterprise Storage Management (19:34)
  • Introduction (00:26)
  • Management of ES (02:43)
  • Deduplication (01:26)
  • Snapshots (01:38)
  • Dynamic Disk Pools (00:59)
  • HBA (01:05)
  • LUN Mapping (00:48)
  • LUN Masking (00:42)
  • Replication (04:57)
  • Encryption in Enterprise Storage (04:26)
  • Summary (00:19)
Host Firewalls (17:39)
  • Introduction (00:31)
  • Host Security (00:35)
  • Host Based Firewalls (07:24)
  • Demo: Windows Firewall Rule (04:57)
  • Demo: Rule Creation (03:46)
  • Summary (00:22)
Anti-Malware (25:51)
  • Introduction (00:29)
  • Anti-Malware (12:36)
  • Beyond Anti-Virus/Malware (06:23)
  • Demo: Command Line Tools (05:55)
  • Summary (00:25)
Hardening (35:51)
  • Introduction (00:26)
  • Hardening (00:39)
  • Hardening Your System (05:20)
  • Trusted OS (01:44)
  • End Point Security (02:51)
  • Patch Management and HIDS (03:06)
  • Data Loss Prevention (01:43)
  • Log Monitoring (01:56)
  • UEFI (01:49)
  • Secure Boot (01:14)
  • Encryption for Our Hosts (02:37)
  • TPM (00:56)
  • HSM (01:33)
  • Services (02:26)
  • Demo: Services (02:20)
  • Demo: Disable Service (04:41)
  • Summary (00:22)