CompTIA Security+, Part 6 of 9: Physical Security and Access Control
Interactive

CompTIA Security+, Part 6 of 9: Physical Security and Access Control

LearnNow Online
Updated Sep 10, 2019

Course description

This course covers physical Security, including surveillance, doors, and bio-metrics as well as the challenges of facilities security. Next, it covers the authentication processes involved in remoting and authentication models as well as access control and best practices. It finishes up with how to use user accounts and groups, user account control as well as permissions and passwords for the SY0-501 Exam.

Each LearnNowOnline training course is made up of Modules (typically an hour in length). Within each module there are Topics (typically 15-30 minutes each) and Subtopics (typically 2-5 minutes each). There is a Post Exam for each Module that must be passed with a score of 70% or higher to successfully and fully complete the course.


Prerequisites

• Basic familiarity with computer networks, administration, and security is helpful (But, all required information will be covered during the course) • Completion of the CompTIA A+ and Network+ certifications (Helpful, but not required)


Meet the expert

Jason Dion

Jason Dion, CISSP No. 349867, is a professor at University of Maryland University College with multiple information technology professional certifications, including Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), Certified Network Defense Architect (CNDA), Digital Forensic Examiner (DFE), Digital Media Collector (DMC), CySA+, Security+, Network+, A+, PRINCE2 Practitioner, and ITIL. He holds a Masters of Science degree in Information Technology with a specialization in Information Assurance

Video Runtime

94 Minutes

Time to complete

161 Minutes

Course Outline

Physical Security and Access Control

Physical Security (14:19)

  • Introduction (00:08)
  • Physical Security (01:30)
  • Surveillance (02:51)
  • Door Locks (03:48)
  • Demo: Lock Picking (01:37)
  • Biometric Readers (04:15)
  • Summary (00:08)

Facilities Security (14:16)

  • Introduction (00:08)
  • Facilities Security (00:36)
  • Fire Suppression (06:21)
  • HVAC (02:23)
  • Shielding (02:35)
  • Vehicles (02:03)
  • Summary (00:08)

Authentication (28:59)

  • Introduction (00:08)
  • Authentication (05:53)
  • Authenication Models (05:17)
  • 802.1x (03:44)
  • LDAP and Kerberos (02:26)
  • Remote Desktop Services (01:51)
  • Remote Access Services (02:03)
  • VPN (03:02)
  • RADIUS and TACACS+ (02:18)
  • Authentication Summary (02:04)
  • Summary (00:08)

Access Control (24:18)

  • Introduction (00:08)
  • Access Control (00:50)
  • Access Control Models (08:14)
  • Best Practices (05:44)
  • Users and Groups (09:12)
  • Summary (00:08)

Permissions (13:02)

  • Introduction (00:08)
  • Permissions (03:41)
  • Usernames and Password (02:36)
  • Demo: Policies (04:34)
  • User Account Control (01:54)
  • Summary (00:08)
;