Home Search Profile

Master Secure Network Implementation: CompTIA SecurityX Pro

Focused View

1:29:25

  • 1. Introduction to Endpoint and Serve.mp4
    03:09
  • 2. Application Control and EDR.mp4
    02:35
  • 3. Event Logging, Monitoring, and End.mp4
    03:35
  • 4. Attack Surface Monitoring and Redu.mp4
    02:54
  • 5. Host-based Security Solutions.mp4
    02:46
  • 6. SELinux and Host-based Firewalls.mp4
    02:49
  • 7. Browser Isolation and Configuratio.mp4
    02:22
  • 8. Mobile Device Management Technolog.mp4
    03:34
  • 9. Understanding Threat-actor TTPs.mp4
    02:42
  • 1. Introduction to Hardware Security.mp4
    00:57
  • 2. Roots of Trust.mp4
    04:02
  • 3. Security Coprocessors and Secure E.mp4
    02:59
  • 4. Virtual Hardware and Host-based En.mp4
    03:51
  • 5. Secure Boot and Measured Boot.mp4
    02:15
  • 6. Self-healing Hardware and Tamper D.mp4
    03:11
  • 7. Hardware Threat-actor TTPs.mp4
    02:12
  • 8. Mitigating Memory, EMI, and EMP Th.mp4
    04:37
  • 1. Introduction to Specialized and Legacy Sys.mp4
    02:01
  • 2. Operational Technology.mp4
    03:04
  • 3. Internet of Things.mp4
    01:28
  • 4. System-on-Chip and Embedded Systems.mp4
    02:37
  • 5. Wireless Technologies and Radio Frequency.mp4
    01:51
  • 6. Security and Privacy Considerations.mp4
    04:11
  • 7. Industry Specific Challenges.mp4
    04:50
  • 8. Characteristics of Specialized or Legacy S.mp4
    03:09
  • 01. Data Protection.mp4
    02:01
  • 02. Authentication and Access Control.mp4
    01:10
  • 03. Secure Communication.mp4
    00:56
  • 04. Blockchain and Immutable Records.mp4
    00:39
  • 05. Privacy and Anonymity.mp4
    00:53
  • 06. Legal and Compliance.mp4
    01:01
  • 07. Data Sanitization and Deletion.mp4
    01:00
  • 08. Software Security.mp4
    01:01
  • 09. Key Management.mp4
    00:51
  • 10. Cryptographic Techniques.mp4
    01:50
  • 11. Integrity and Verification.mp4
    01:08
  • 12. Obfuscation and Tokenization.mp4
    01:39
  • 1. Domain Summary.mp4
    01:35
  • More details


    Course Overview

    This comprehensive course equips you with essential security engineering skills to protect networks against modern threats. Learn to secure endpoints, implement hardware protections, safeguard legacy systems, and apply cryptographic techniques for the CompTIA SecurityX exam.

    What You'll Learn

    • Enhance endpoint and server security with application control and EDR
    • Implement hardware security technologies like secure boot and tamper detection
    • Apply cryptographic techniques for data protection and secure communication

    Who This Is For

    • IT professionals preparing for CompTIA SecurityX certification
    • Network administrators enhancing security skills
    • Security engineers specializing in infrastructure protection

    Key Benefits

    • Hands-on skills for real-world network security challenges
    • Exam-focused content aligned with CompTIA SecurityX objectives
    • Comprehensive coverage of modern and legacy system protection

    Curriculum Highlights

    1. Enhancing Security of Endpoints and Servers
    2. Implementing Hardware Security Technologies
    3. Securing Specialized Legacy Systems
    Focused display
    • language english
    • Training sessions 38
    • duration 1:29:25
    • level average
    • English subtitles has
    • Release Date 2025/06/08

    Courses related to CompTIA Security+

    Subtitles
    Master GRC for CompTIA SecurityX: Pro 2024 Guide
    Master GRC for CompTIA SecurityX: Pro 2024 Guide
    1:28:52
    English subtitles
    11/13/2024
    Subtitles
    Master CompTIA Security+ SY0-701: Complete 2024 Certification Prep
    Subtitles
    Master Secure Network Architecture for CompTIA SecurityX Pro

    Courses related to Cyber Security

    Courses related to Network Security

    Courses related to Information Security