CompTIA Security+, Part 2 of 9: Mobile Devices and Hardening
Interactive

CompTIA Security+, Part 2 of 9: Mobile Devices and Hardening

LearnNow Online
Updated Sep 10, 2019

Course description

This course will cover firewalls, Intrusion Detection Systems and Pop-up blockers as well as securing BIOS and Storage Devices. Next, it covers the securing of mobile devices as well as theft and how to harden a system against attack by removing unnecessary services. It finishes with updating, patching as well as policies and patch management for the for the SY0-501 Exam.

Each LearnNowOnline training course is made up of Modules (typically an hour in length). Within each module there are Topics (typically 15-30 minutes each) and Subtopics (typically 2-5 minutes each). There is a Post Exam for each Module that must be passed with a score of 70% or higher to successfully and fully complete the course.


Prerequisites

• Basic familiarity with computer networks, administration, and security is helpful (But, all required information will be covered during the course) • Completion of the CompTIA A+ and Network+ certifications (Helpful, but not required)


Meet the expert

Jason Dion

Jason Dion, CISSP No. 349867, is a professor at University of Maryland University College with multiple information technology professional certifications, including Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), Certified Network Defense Architect (CNDA), Digital Forensic Examiner (DFE), Digital Media Collector (DMC), CySA+, Security+, Network+, A+, PRINCE2 Practitioner, and ITIL. He holds a Masters of Science degree in Information Technology with a specialization in Information Assurance

Video Runtime

102 Minutes

Time to complete

173 Minutes

Course Outline

Mobile Devices and Hardening

Security Applications (20:03)

  • Introduction (00:08)
  • Security Applications and Devices (00:33)
  • Software Firewalls (04:16)
  • Demo: Software Firewalls (06:45)
  • IDS (05:03)
  • Pop-up Blockers (03:09)
  • Summary (00:08)

Data Loss Prevention (16:14)

  • Introduction (00:08)
  • Data Loss Prevention (03:43)
  • Securing the BIOS (03:56)
  • Securing Storage Devices (03:26)
  • Disk Encryption (04:51)
  • Summary (00:08)

Mobile Device Security (15:30)

  • Introduction (00:08)
  • Mobile Device Security (01:14)
  • Securing Wireless Devices (01:30)
  • Mobile Malware (06:19)
  • Sim Cloning and ID Theft (04:01)
  • Bluetooth Attacks (02:08)
  • Summary (00:08)

Mobile Device Theft (17:22)

  • Introduction (00:08)
  • Mobile Device Theft (03:10)
  • Security of Apps (05:06)
  • BYOD (04:56)
  • Hardening Mobile Devices (03:52)
  • Summary (00:08)

Hardening (15:44)

  • Introduction (00:08)
  • Hardening (01:48)
  • Unnecessary Applications (03:11)
  • Restricting Applications (02:56)
  • Unnecessary Services (05:35)
  • Trusted Operating Systems (01:57)
  • Summary (00:08)

Updates and Patches (17:31)

  • Introduction (00:08)
  • Updates and Patches (03:26)
  • Patch Management (03:49)
  • Group Policies (02:34)
  • Group Policy (Lab) (04:06)
  • File Systems and Hard Drives (03:18)
  • Summary (00:08)
;