CompTIA Security+: Mitigation Techniques
Learn security measures including access control, encryption, and monitoring. Discover hardening techniques like EDR, HIDS/HIPS, and default password changes.
About this course
As a security professional, it is always better to be proactive with mitigation rather than purely reactive. Begin this course by exploring segmentation and isolation, access control mechanisms, and configuration and patch management. Next, you will investigate the principles of least privilege and separation of duties and find out how encryption technologies can shield private information from unauthorized users. Then you will examine the monitoring and visibility of access controls and learn the best practices for decommissioning and offboarding. Finally, you will focus on hardening techniques, including endpoint detection and response (EDR), host intrusion detection system (HIDS)/host intrusion prevention system (HIPS), disabling ports/protocols, default password changes, and removal of unnecessary software. This course is part of a series that prepares you for the CompTIA Security+ (SY0-701) exam.
Learning objectives
Discover the key concepts covered in this course
Describe segmentation and isolation techniques
Compare access controls, including access control lists (acls), network access control lists (nacls), permissions, allow-lists, and cloud solution provider (csp) security groups
Show all
There are no reviews yet.