CompTIA CASP CAS-002: Security Controls for Hosts New Horizons Lebanon
Price: TBA
  • Duration: 2 Hours

Course details

  • Host security plays a tremendously important role in network security. Even if all your network links are secured, improperly secured hosts can leave your organization open to attack. In this course, you'll learn about end point security solutions, security controls and host hardening techniques, boot protection mechanisms, and finally you will learn about securing virtualized and cloud environments. This course is one of a series in the Skillsoft learning path that covers the objectives for the CompTIA Advanced Security Practitioner (CAS-002) certification exam.
  • start the course
  • describe how end point security software is used to secure network environments
  • define how and when a trusted OS configuration would be used to secure a networked environment
  • define how data loss prevention and patch management are used to secure network environments
  • define how host based firewalls and log monitoring are used to secure network environments
  • define how Standard Operating Environment configuration baselines are used to secure network environments
  • define how security group policy implementations are used to secure network environments
  • define how command shell restrictions are used to secure network environments
  • define how dedicated interfaces and out-of-band NICs are used to secure network environments
  • describe the use of ACLs, VLANs and authentication servers in providing additional security for network device management
  • define how peripheral restrictions are used to secure network environments
  • define how securing virtualized servers is used to secure network environments
  • define how sandboxing and content filtering in cloud environments is used to secure network environments
  • define how hash matching in cloud environments is used to secure network environments
  • define how secure boot and measured launch are used to secure network environments
  • define how BIOS and Unified Extensible Firmware Interface are used to secure network environments
  • define how Integrity Measurement Architecture is used to secure network environments
  • describe how VM escape is used as a network attack
  • describe how live VM migration presents security challenges
  • define how privilege elevation and data remnants present challenges to network security
  • describe the security challenges associated with Virtual Desktop Infrast
Updated on 08 November, 2015

About New Horizons Lebanon

As changes in technology have accelerated, it’s become even more essential for people to master technology to be productive, invaluable employees who optimize, program and invent solutions—and even grow companies of their own. With over 300 centers in 60 countries, New Horizons is the world’s largest independent IT and Business training company. Over the past 35 years, New Horizons has delivered a full range of IT and business skills/Management training through innovative learning methods that have transformed businesses and helped over 35 million students reach their goals. New Horizons Lebanon branch was established in 1996.

See all New Horizons Lebanon courses
Courses you can instantly connect with... Do an online course on CompTIA starting now. See all courses

Is this the right course for you?

Rate this page

Didn't find what you were looking for ?

or