CompTIA CASP CAS-002: Security Controls for Hosts


Overview/Description
Target Audience
Prerequisites
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description
Host security plays a tremendously important role in network security. Even if all your network links are secured, improperly secured hosts can leave your organization open to attack. In this course, you'll learn about end point security solutions, security controls and host hardening techniques, boot protection mechanisms, and finally you will learn about securing virtualized and cloud environments. This course is one of a series in the Skillsoft learning path that covers the objectives for the CompTIA Advanced Security Practitioner (CAS-002) certification exam.

Target Audience
Security candidates looking to certify their technical knowledge and skills required to conceptualize, engineer, integrate, and implement secure solutions across complex environments

Prerequisites
None

Expected Duration (hours)
2.1

Lesson Objectives

CompTIA CASP CAS-002: Security Controls for Hosts

  • start the course
  • describe how end point security software is used to secure network environments
  • define how and when a trusted OS configuration would be used to secure a networked environment
  • define how data loss prevention and patch management are used to secure network environments
  • define how host based firewalls and log monitoring are used to secure network environments
  • define how Standard Operating Environment configuration baselines are used to secure network environments
  • define how security group policy implementations are used to secure network environments
  • define how command shell restrictions are used to secure network environments
  • define how dedicated interfaces and out-of-band NICs are used to secure network environments
  • describe the use of ACLs, VLANs and authentication servers in providing additional security for network device management
  • define how peripheral restrictions are used to secure network environments
  • define how securing virtualized servers is used to secure network environments
  • define how sandboxing and content filtering in cloud environments is used to secure network environments
  • define how hash matching in cloud environments is used to secure network environments
  • define how secure boot and measured launch are used to secure network environments
  • define how BIOS and Unified Extensible Firmware Interface are used to secure network environments
  • define how Integrity Measurement Architecture is used to secure network environments
  • describe how VM escape is used as a network attack
  • describe how live VM migration presents security challenges
  • define how privilege elevation and data remnants present challenges to network security
  • describe the security challenges associated with Virtual Desktop Infrastructure
  • describe security challenges associated with Remote Desktop Services and App-V
  • describe how TPM, VTPM, and HSM are used to secure network environments
  • implementing Security Controls for Hosts
  • Course Number:
    sp_capr_a03_it_enus

    Expertise Level
    Expert