Moocable is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

CASP+ Cert Prep: 2 Enterprise Security Architecture

Description

Study for domain 2 of the CompTIA Advanced Security Practitioner (CASP+) certification exam: building a secure enterprise network.

Tags

Syllabus

Syllabus IntroductionEnterprise security architectureWhat you should knowAbout the exam1. Network and Security ComponentsNetwork designSwitchesRoutersImportance of portsProxyFirewallsWeb application firewalls (WAF) and next-generation firewalls (NGFW)Firewall architectureWireless controllersVirtual desktop infrastructureRemote accessTransport encryptionBasic network authentication methodsMultifactor authentication factors802.1x authentication standardIPv6 and transitional technologiesMesh networksUnified threat management (UTM)NIDS and NIPSSIEMHardware security modules (HSM)In-line network encryptor (INE)Vulnerability scannersDatabase activity monitors2. Security Solutions in the ArchitectureSecurity solutions in the architectureNetwork flow, packet analysis, and break and inspectACLs and rule setsChange monitoringAvailability controlsRAIDS and SANsSoftware-defined networkingCloud-managed networksNetwork management and monitoringTrunking securityPort securityRoute protectionDDoS protectionRemotely triggered black holesSecurity zonesNetwork access controlNetwork-enabled devicesCritical infrastructure3. Securing Host DevicesSecuring host devicesTrusted operating systemAnti-malwareHost-based firewallHIDS and HIPSData loss preventionLog monitoringEndpoint detection responseWhat is host hardening?Patch managementBaselining configurationApplication whitelisting and blacklistingGroup policiesCommand line restrictionsConfiguring dedicated interfacesRestricting peripheralsFile and disk encryptionBoot loader protectionsCloud-augmented securitySecurity through virtualizationHardware vulnerabilities in virtualizationTerminal services and application delivery services4. Securing Mobile and Small Form Factor DevicesMobile and small form factor device securityEnterprise mobility managementBYOD vs. COPEApplication security for mobile devicesOver-the-air updatesRemote assistanceRemote accessAuthenticationContext-aware security measuresPrivacy concernsMobile paymentTetheringWearable technologySecurity implications of wearable technology5. Software VulnerabilitiesApplication security designApplication specific issuesMore application specific issuesDatabase activity monitoring (DAM) and web application firewalls (WAF)Client and server-side processingConclusionNext steps Read more


CASP+ Cert Prep: 2 Enterprise Security Architecture

Affiliate notice

Study for domain 2 of the CompTIA Advanced Security Practitioner (CASP+) certification exam: building a secure enterprise network.

Syllabus IntroductionEnterprise security architectureWhat you should knowAbout the exam1. Network and Security ComponentsNetwork designSwitchesRoutersImportance of portsProxyFirewallsWeb application firewalls (WAF) and next-generation firewalls (NGFW)Firewall architectureWireless controllersVirtual desktop infrastructureRemote accessTransport encryptionBasic network authentication methodsMultifactor authentication factors802.1x authentication standardIPv6 and transitional technologiesMesh networksUnified threat management (UTM)NIDS and NIPSSIEMHardware security modules (HSM)In-line network encryptor (INE)Vulnerability scannersDatabase activity monitors2. Security Solutions in the ArchitectureSecurity solutions in the architectureNetwork flow, packet analysis, and break and inspectACLs and rule setsChange monitoringAvailability controlsRAIDS and SANsSoftware-defined networkingCloud-managed networksNetwork management and monitoringTrunking securityPort securityRoute protectionDDoS protectionRemotely triggered black holesSecurity zonesNetwork access controlNetwork-enabled devicesCritical infrastructure3. Securing Host DevicesSecuring host devicesTrusted operating systemAnti-malwareHost-based firewallHIDS and HIPSData loss preventionLog monitoringEndpoint detection responseWhat is host hardening?Patch managementBaselining configurationApplication whitelisting and blacklistingGroup policiesCommand line restrictionsConfiguring dedicated interfacesRestricting peripheralsFile and disk encryptionBoot loader protectionsCloud-augmented securitySecurity through virtualizationHardware vulnerabilities in virtualizationTerminal services and application delivery services4. Securing Mobile and Small Form Factor DevicesMobile and small form factor device securityEnterprise mobility managementBYOD vs. COPEApplication security for mobile devicesOver-the-air updatesRemote assistanceRemote accessAuthenticationContext-aware security measuresPrivacy concernsMobile paymentTetheringWearable technologySecurity implications of wearable technology5. Software VulnerabilitiesApplication security designApplication specific issuesMore application specific issuesDatabase activity monitoring (DAM) and web application firewalls (WAF)Client and server-side processingConclusionNext steps Read more