CompTIA Server+ SK0-004: Security

Established IT professionals who wish to acquire job skills and to be trained specifically to pass the CompTIA Server+ 2014 certification exam


Expected Duration
159 minutes

Because so much work is done electronically, businesses and governments generate vast amounts of information, most of which needs to be safe. Security technologies have improved with the growth of data requirements. This course introduces the methods and concepts involved in physically protecting this data. As well, you’ll learn about the different server hardening techniques, the different types of network security systems and protocols, as well as logical access control methods. This course also covers how to securely dispose storage and how to implement proper environmental controls in your server room. This course is one of a series in the SkillSoft learning path that maps to CompTIA’s Server+ exam, SK0-004, and covers the following exam objectives: 4.1 Compare and contrast physical security methods and concepts, 4.2 Given a scenario, apply server hardening techniques, 4.3 Explain basic network security systems and protocols, 4.4 Implement logical access control methods based on company policy, 4.5 Implement data security methods and secure storage disposal techniques, and 4.6 Given a scenario, implement proper environmental controls and techniques.


Physical Security Methods and Concepts

  • start the course
  • compare and contrast multifactor authentication methods and concepts
  • compare and contrast physical security methods and concepts
  • compare and contrast additional physical security methods and concepts

Server Hardening Techniques

  • apply OS hardening techniques
  • apply application hardening techniques
  • apply endpoint security techniques
  • recognize remediate security issues based on vulnerability scan
  • apply hardware hardening techniques

Basic Network Security Systems and Protocols

  • describe a network-based and host-based firewall
  • describe 802.1x and NAC port security
  • describe what a router access list is and how it helps secure network security systems
  • describe a network intrusion detection system (NIDS)
  • identify and explain the different authentication protocols
  • describe the public key infrastructure process
  • describe a VPN, IPSEC, and VLAN
  • distinguish between the different security zones including DMZ, public versus private, and intranet versus extranet

Logical Access Control Methods

  • implement access control lists user, groups, and roles
  • recognize access control list resource methods
  • recognize access control list permission statements

Data Security Methods and Storage Disposal

  • implement data security methods
  • implement secure storage disposal techniques

Environmental Controls and Techniques

  • implement proper power concepts and use best practices
  • implement proper power distribution concepts and use best practices
  • describe capacity planning concepts
  • describe multiple circuit concepts
  • implement proper safety controls and techniques
  • implement proper additional safety controls and techniques
  • implement proper environmental controls and techniques

Practice: Implementing Security

  • understand the options available for securing the server environment





Multi-license discounts available for Annual and Monthly subscriptions.