CASP, Part 3 of 9: Enterprise Storage and Host Security
Interactive

CASP, Part 3 of 9: Enterprise Storage and Host Security

LearnNow Online
Updated Aug 21, 2018

Course description

Are you ready to learn about enterprise storage security? How about host security? This course will dive into the protocols for enterprise storage as well as the types of storage available, even in your small business or home office. We will examine the various methods of storage management and how to replicate data to allow for fault tolerance and disaster recovery. After discussing storage, we will focus on host security with an emphasis on anti-malware, host-based firewalls, and more. This course is part of a series covering the CompTIA Advanced Security Practitioner (CASP).

Each LearnNowOnline training course is made up of Modules (typically an hour in length). Within each module there are Topics (typically 15-30 minutes each) and Subtopics (typically 2-5 minutes each). There is a Post Exam for each Module that must be passed with a score of 70% or higher to successfully and fully complete the course.


Prerequisites

This course assumes that you have familiarity with information technology, basic networking, and basic security concepts. No scripting or “hacking” experience is required. Having windows command line experience as well as having administrative rights on your machine will be helpful.


Meet the expert

David Bigger

David Bigger is the lead trainer at Bigger IT Solutions. He has been information technology for a little over 20 years and has been training all over the US. He has worked with companies like US Military, Lockheed Martin, General Dynamics, Dominos Pizza, University of Utah and Expedia

Video Runtime

123 Minutes

Time to complete

143 Minutes

Course Outline

Enterprise Storage and Security

Intro to Enterprise Storage (14:45)

  • Introduction (00:28)
  • Intro to Enterprise Storage (02:02)
  • Types of Enterprise Storage (03:07)
  • NAS Protocols (01:20)
  • What Can Go Wrong with a NAS? (02:16)
  • SAN (01:28)
  • What Can Go Wrong with a SAN? (01:29)
  • vSAN (01:07)
  • What Can Go Wrong with a vSAN? (00:58)
  • Summary (00:28)

Enterprise Storage Protocol (09:36)

  • Introduction (00:27)
  • Protocol for ES (00:44)
  • iSCSI (02:20)
  • Fibre Channel (02:23)
  • FCoE (01:08)
  • Any Issues with FCoE? (02:06)
  • Summary (00:24)

Enterprise Storage Management (19:34)

  • Introduction (00:26)
  • Management of ES (02:43)
  • Deduplication (01:26)
  • Snapshots (01:38)
  • Dynamic Disk Pools (00:59)
  • HBA (01:05)
  • LUN Mapping (00:48)
  • LUN Masking (00:42)
  • Replication (04:57)
  • Encryption in Enterprise Storage (04:26)
  • Summary (00:19)

Host Firewalls (17:39)

  • Introduction (00:31)
  • Host Security (00:35)
  • Host Based Firewalls (07:24)
  • Demo: Windows Firewall Rule (04:57)
  • Demo: Rule Creation (03:46)
  • Summary (00:22)

Anti-Malware (25:51)

  • Introduction (00:29)
  • Anti-Malware (12:36)
  • Beyond Anti-Virus/Malware (06:23)
  • Demo: Command Line Tools (05:55)
  • Summary (00:25)

Hardening (35:51)

  • Introduction (00:26)
  • Hardening (00:39)
  • Hardening Your System (05:20)
  • Trusted OS (01:44)
  • End Point Security (02:51)
  • Patch Management and HIDS (03:06)
  • Data Loss Prevention (01:43)
  • Log Monitoring (01:56)
  • UEFI (01:49)
  • Secure Boot (01:14)
  • Encryption for Our Hosts (02:37)
  • TPM (00:56)
  • HSM (01:33)
  • Services (02:26)
  • Demo: Services (02:20)
  • Demo: Disable Service (04:41)
  • Summary (00:22)
;