Learn your way! Get started

CompTIA Sec+ SY0-401, Part 7 of 8: Data Security Auth [Deprecated/Replaced]

with expert Ryan Hendricks


Watch trailer


Course at a glance

Included in these subscriptions:

  • Dev & IT Pro Video
  • Dev & IT Pro Power Pack

Release date 4/15/2016
Level Intermediate
Runtime 2h 46m
Closed captioning Included
Transcript Included
eBooks / courseware N/A
Hands-on labs N/A
Sample code N/A
Exams Included


Enterprise Solutions

Need reporting, custom learning tracks, or SCORM? Learn More



Course description

With an expanding array of smartphones, laptops and tablets now present in the enterprise, security expert Ryan Hendricks looks at what security and IT professionals can do to make these devices more secure. This course also examines security issues on the desktop and what’s new with firewalls and anti-virus programs. In addition to imparting insights about how to protect specific devices, Hendricks also examines the underlying concepts of identification, authentication factors and account management.

Prerequisites

This course assumes that the user has working knowledge of networks and networking. Ideally, the user should have their CompTIA Network+ certification, but can be replaced with networking experience.

Learning Paths

This course will help you prepare for the following certification and exam:
CompTIA Security+ Certification
SY0-401: CompTIA Security+

Meet the expert

Ryan Hendricks is an experienced instructor who teaches networking and security courses to IT professionals throughout the nation. He currently has the CompTIA Certified Technical Trainer (CTT+ Classroom) and the Cisco Certified Academy Instructor (CCAI) credentials. He holds certifications from (ISC)2, EC-Council, CompTIA, and Cisco. When not on the podium instructing, he delves into IT books, always looking to learn more and keep up with the latest security topics.

Course outline



Data Security

Mobile Devices (24:08)
  • Introduction (00:23)
  • Device Security (06:36)
  • Device Security, Cont. (03:29)
  • Application Security (05:24)
  • BYOD Concerns (04:53)
  • BYOD Concerns, Cont. (03:02)
  • Summary (00:20)
Host Security (16:55)
  • Introduction (00:21)
  • OS Security and Settings (00:47)
  • OS Hardening (02:02)
  • Anti-Malware (02:21)
  • Patch Management (01:21)
  • Trusted OS (01:15)
  • Host-Based Firewalls (00:59)
  • Host-Based Intrusion Detection (01:44)
  • Hardware Security (01:04)
  • Host Software Baselining (01:06)
  • Virtualization (03:26)
  • Summary (00:24)
Data Security (26:25)
  • Introduction (00:20)
  • Cloud Storage (02:30)
  • Storage Attached Network (SAN) (01:03)
  • Handling Big Data (02:00)
  • Data Encryption (04:52)
  • Hardware Based Encryption (03:45)
  • Data In-Transit (01:53)
  • Data At-Rest (00:51)
  • Data In-Use (01:59)
  • Permissions/ACLs (01:12)
  • Data Policies (05:16)
  • Summary (00:38)
Environment (22:33)
  • Introduction (00:27)
  • Heating, Ventilation, and AC (01:59)
  • Fire Suppression (02:54)
  • EMI Shielding (02:18)
  • Hot and Cold Isles (01:26)
  • SCADA (02:17)
  • Embedded (01:29)
  • Android (02:33)
  • Mainframe (00:52)
  • Game Consoles (01:16)
  • In-Vehicle Computing Systems (01:19)
  • Methods (03:12)
  • Summary (00:23)

Authentication

Authentication (19:24)
  • Introduction (00:19)
  • Identification (01:04)
  • Authentication (00:40)
  • Something You Know (01:09)
  • Something you have (03:51)
  • Something You Are (04:01)
  • Biometrics (03:02)
  • Additional Authentication (02:59)
  • Single Factor (00:01)
  • Multi-Factor (01:44)
  • Summary (00:29)
Authentication Services (17:12)
  • Introduction (00:21)
  • RADIUS (02:40)
  • TACACS (02:24)
  • Kerberos (00:49)
  • Kerberos Explained (04:05)
  • Single Sign-On (SSO) (01:30)
  • LDAP (01:18)
  • Secure LDAP (00:40)
  • SAML (01:21)
  • Federated Identity (01:36)
  • Summary (00:24)
Authorization (12:33)
  • Introduction (00:20)
  • Authorization? (00:51)
  • Mandatory Access Control (02:25)
  • MAC, Cont. (01:12)
  • Discretionary Access Control (01:10)
  • DAC, Cont. (00:44)
  • Role-Based Access Control (01:30)
  • RBAC, Cont. (00:16)
  • MAC, DAC, and RBAC (01:14)
  • Time of Day Restrictions (02:13)
  • Summary (00:33)
Account Management (26:55)
  • Introduction (00:20)
  • Shared Accounts (00:00)
  • Multiple Accounts (00:55)
  • Account Policy Enforcement (00:35)
  • Policy Enforcement, Cont. (10:03)
  • Demo: Password Policy (05:15)
  • Demo: More Password Policy (04:26)
  • User Assigned Privileges (00:58)
  • Group Based Privileges (01:00)
  • User Access Reviews (01:31)
  • Continuous Monitoring (01:19)
  • Summary (00:27)