CompTIA CASP CAS-002: Security Controls for Hosts

Security candidates looking to certify their technical knowledge and skills required to conceptualize, engineer, integrate, and implement secure solutions across complex environments

Prerequisite
None

Expected Duration
124 minutes

Description
Host security plays a tremendously important role in network security. Even if all your network links are secured, improperly secured hosts can leave your organization open to attack. In this course, you’ll learn about end point security solutions, security controls and host hardening techniques, boot protection mechanisms, and finally you will learn about securing virtualized and cloud environments. This course is one of a series in the Skillsoft learning path that covers the objectives for the CompTIA Advanced Security Practitioner (CAS-002) certification exam.

Objective

End Point Security

  • start the course
  • describe how end point security software is used to secure network environments
  • define how and when a trusted OS configuration would be used to secure a networked environment
  • define how data loss prevention and patch management are used to secure network environments
  • define how host based firewalls and log monitoring are used to secure network environments

Security Controls and Host Hardening

  • define how Standard Operating Environment configuration baselines are used to secure network environments
  • define how security group policy implementations are used to secure network environments
  • define how command shell restrictions are used to secure network environments
  • define how dedicated interfaces and out-of-band NICs are used to secure network environments
  • describe the use of ACLs, VLANs and authentication servers in providing additional security for network device management
  • define how peripheral restrictions are used to secure network environments

Securing Virtualized and Cloud Environments

  • define how securing virtualized servers is used to secure network environments
  • define how sandboxing and content filtering in cloud environments is used to secure network environments
  • define how hash matching in cloud environments is used to secure network environments

Boot Loader Protections

  • define how secure boot and measured launch are used to secure network environments
  • define how BIOS and Unified Extensible Firmware Interface are used to secure network environments
  • define how Integrity Measurement Architecture is used to secure network environments

Mingling Hosts with Diverse Security Requirements

  • describe how VM escape is used as a network attack
  • describe how live VM migration presents security challenges
  • define how privilege elevation and data remnants present challenges to network security
  • describe the security challenges associated with Virtual Desktop Infrastructure
  • describe security challenges associated with Remote Desktop Services and App-V
  • describe how TPM, VTPM, and HSM are used to secure network environments

Practice: Security

  • implementing Security Controls for Hosts

MONTHLY SUBSCRIPTION

$129/month
 

ANNUAL SUBSCRIPTION

$1295/year

Multi-license discounts available for Annual and Monthly subscriptions.