Course description
In this course for the CompTIA A+ 1101-1102 exam, we will cover how to understand security threats as well as how to secure workstations, mobile devices and networks.
Prerequisites
This course assumes the user has little to experience with computer hardware or software.
Meet the expert
Patrick Loner has certifications for MCSA, MCSE, MCITP, A+, Network+, Security+, and more. He has been working as a Microsoft Certified Trainer, network administrator, and network consultant for over ten years. He has over a decade of experience working with and teaching about Windows networks with client and server operating systems. He has guided many students toward Microsoft and CompTIA certifications. Most recently, he has worked as a freelance trainer and network consultant specializing in Windows Server 2008 and Microsoft Exchange 2007 and Exchange 2010 implementations, design, and upgrades. Patrick continues to branch out now working with and training on Windows Server 2012, Windows 8, Exchange 2013, and System Center Configuration Manager 2012.
Course outline
Module 16
Understanding Threats to Security (27:34)
- Introduction (00:08)
- Understanding Threats to Security (01:24)
- User Threats (02:49)
- Social Engineering (02:14)
- Phishing (05:56)
- Network Threats (04:10)
- Password Attacks (01:26)
- Vulnerabilities (03:17)
- Malicious Code Attacks (00:45)
- Malware Types (03:45)
- Physical Threats (01:27)
- Summary (00:08)
Understanding Common Prevention Methods (58:06)
- Introduction (00:08)
- Understanding Common Prevention Methods (00:58)
- Physical Access Restrictions (02:23)
- Physical Security (02:30)
- Anti-Malware (03:26)
- Demo: Anti-Malware (05:01)
- Anti Spyware (00:41)
- Best Practices (01:37)
- Firewalls (01:12)
- Hardware Firewalls (01:18)
- Firewall Functionality (01:18)
- Proxy Firewalls (00:58)
- Stateful Packet Inspection (00:53)
- Host Based Firewalls (01:16)
- Windows Firewall with Advanced Security (01:52)
- Demo: Windows Defender (10:44)
- User Authentication (02:19)
- Password Best Practices (01:10)
- Demo: Password Check (03:49)
- Multifactor Authentication (01:05)
- Virtual Private Networks (00:45)
- Data Loss Prevention (01:00)
- System Hardening (02:05)
- Trusted Software (02:29)
- User Education (02:26)
- Demo: Data Loss Prevention (04:25)
- Summary (00:08)
Securing Workstations (27:15)
- Introduction (00:08)
- Securing Workstations (01:02)
- Least Privilege (01:40)
- Password Best Practices (05:07)
- Account Management (02:53)
- Disabling Autorun (00:51)
- Data Encryption (01:31)
- Demo: Bitlocker and EFS (11:38)
- Patch Management (02:13)
- Summary (00:08)
Module 17
Securing Mobile Devices (13:53)
- Introduction (00:08)
- Securing Mobile Devices (01:28)
- Screen Locks (02:16)
- Finding Mobile Devices (01:32)
- Backup Mobile Devices (01:15)
- Login Restrictions (01:07)
- Antimalware and Updates (00:50)
- Encryption and Biometrics (01:06)
- Policies and Procedures (01:57)
- Best Practices (02:00)
- Summary (00:08)
Data Destruction and Disposal Methods (09:02)
- Introduction (00:08)
- Destruction and Disposal (01:32)
- Physical Destruction (01:04)
- Drilling (01:29)
- Additional Physical Methods (01:01)
- Recycling or Repurposing (01:50)
- Repurposing Options (01:46)
- Summary (00:08)
Security for SOHO and Wireless Networks (16:34)
- Introduction (00:08)
- SOHO Networks (01:43)
- Wireless Security Options (04:51)
- Device Configuration (00:38)
- Confiure IP and MAC Filters (01:21)
- Configure SOHO Firewalls (01:09)
- Security for SOHO and Wireless (01:40)
- Demo: Security Configuration on Router (04:52)
- Summary (00:08)