Security Engineering: Secure Network Implementation for CompTIA SecurityX
Secure your network with essential skills. This course will teach you to enhance endpoint and server security, implement hardware security, protect specialized legacy systems, and apply cryptographic techniques needed for the CompTIA SecurityX exam.
What you'll learn
In today's digital landscape, securing networks against sophisticated threats is crucial. In this course, Security Engineering: Secure Network Implementation for CompTIA SecurityX, you’ll learn to implement comprehensive security measures for your network. First, you’ll explore how to enhance the security of endpoints and servers, including application control, event logging, and threat monitoring. Next, you’ll discover techniques for implementing robust hardware security technologies, such as secure boot and tamper detection. Finally, you’ll learn how to secure specialized legacy systems and apply appropriate cryptographic techniques. When you’re finished with this course, you’ll have the skills and knowledge of security engineering needed for the CompTIA SecurityX exam.
Table of contents
- Introduction to Endpoint and Server Security 3m
- Application Control and EDR 3m
- Event Logging, Monitoring, and Endpoint Privilege Management 4m
- Attack Surface Monitoring and Reduction 3m
- Host-based Security Solutions 3m
- SELinux and Host-based Firewalls 3m
- Browser Isolation and Configuration Management 2m
- Mobile Device Management Technologies 4m
- Understanding Threat-actor TTPs 3m
- Introduction to Specialized and Legacy Systems 2m
- Operational Technology 3m
- Internet of Things 1m
- System-on-Chip and Embedded Systems 3m
- Wireless Technologies and Radio Frequency 2m
- Security and Privacy Considerations 4m
- Industry Specific Challenges 5m
- Characteristics of Specialized or Legacy Systems 3m
- Data Protection 2m
- Authentication and Access Control 1m
- Secure Communication 1m
- Blockchain and Immutable Records 1m
- Privacy and Anonymity 1m
- Legal and Compliance 1m
- Data Sanitization and Deletion 1m
- Software Security 1m
- Key Management 1m
- Cryptographic Techniques 2m
- Integrity and Verification 1m
- Obfuscation and Tokenization 2m