CompTIA CASP CAS-002: Security Controls for Hosts

This course is included in our On-demand training solution.

Overview

Host security plays a tremendously important role in network security. Even if all your network links are secured, improperly secured hosts can leave your organization open to attack. In this course, you’ll learn about end point security solutions, security controls and host hardening techniques, boot protection mechanisms, and finally you will learn about securing virtualized and cloud environments. This course is one of a series in the Skillsoft learning path that covers the objectives for the CompTIA Advanced Security Practitioner (CAS-002) certification exam.

Target Audience

Security candidates looking to certify their technical knowledge and skills required to conceptualize, engineer, integrate, and implement secure solutions across complex environments

Prerequisites

None

Expected Duration

120 min.

Course Objectives

Course Introduction

End Point Security Software

  • describe how end point security software is used to secure network environments
  • Trusted OS

  • define how and when a trusted OS configuration would be used to secure a networked environment
  • Data Loss Prevention and Patch Management

  • define how data loss prevention and patch management are used to secure network environments
  • Host Based Firewalls and Log Monitoring

  • define how host based firewalls and log monitoring are used to secure network environments
  • Standard Operating Environment Configuration Baselines

  • define how Standard Operating Environment configuration baselines are used to secure network environments
  • Security Group Policy Implementations

  • define how security group policy implementations are used to secure network environments
  • Command Shell Restrictions

  • define how command shell restrictions are used to secure network environments
  • Dedicated Interfaces and Out-of-Band NICs

  • define how dedicated interfaces and out-of-band NICs are used to secure network environments
  • Additional Management Traffic Security Measures

  • describe the use of ACLs, VLANs and authentication servers in providing additional security for network device management
  • Peripheral Restrictions

  • define how peripheral restrictions are used to secure network environments
  • Securing Virtualized Servers

  • define how securing virtualized servers is used to secure network environments
  • Sandboxing and Content Filtering in Cloud Environments

  • define how sandboxing and content filtering in cloud environments is used to secure network environments
  • Hash Matching in Cloud Environments

  • define how hash matching in cloud environments is used to secure network environments
  • Secure Boot and Measured Launch

  • define how secure boot and measured launch are used to secure network environments
  • BIOS and Unified Extensible Firmware Interface

  • define how BIOS and Unified Extensible Firmware Interface are used to secure network environments
  • Integrity Measurement Architecture

  • define how Integrity Measurement Architecture is used to secure network environments
  • VM Escape

  • describe how VM escape is used as a network attack
  • Live VM Migration

  • describe how live VM migration presents security challenges
  • Privilege Elevation and Data Remnants

  • define how privilege elevation and data remnants present challenges to network security
  • The Virtual Desktop Infrastructure

  • describe the security challenges associated with Virtual Desktop Infrastructure
  • Remote Desktop Services and App-V

  • describe security challenges associated with Remote Desktop Services and App-V
  • TPM, VTPM, and HSM

  • describe how TPM, VTPM, and HSM are used to secure network environments
  • Exercise: Host Security

    SUBSCRIPTION COST



     

    NEED HELP OR NOT SURE?