IT Security/Threats/Threat Mitigation
< IT Security < ThreatsThis lesson covers threat mitigation.
Objectives and Skills
Objectives and skills for the threat mitigation portion of Security+ certification include:[1]
- Analyze a scenario and select the appropriate type of mitigation and deterrent techniques.
- Monitoring system logs
- Event logs
- Audit logs
- Security logs
- Access logs
- Hardening
- Disabling unnecessary services
- Protecting management interfaces and applications
- Password protection
- Disabling unnecessary accounts
- Network security
- MAC limiting and filtering
- 802.1x
- Disabling unused interfaces and unused application service ports
- Rogue machine detection
- Security posture
- Initial baseline configuration
- Continuous security monitoring
- Remediation
- Reporting
- Alarms
- Alerts
- Trends
- Detection controls vs. prevention controls
- IDS vs. IPS
- Camera vs. guard
- Monitoring system logs
Multimedia
- Watch YouTube: Monitoring System Logs - CompTIA Security+ SY0-401: 3.6.
- Watch YouTube: Operating System Hardening - CompTIA Security+ SY0-401: 3.6.
- Watch YouTube: Physical Port Security - CompTIA Security+ SY0-401: 3.6.
- Watch YouTube: Security Posture - CompTIA Security+ SY0-401: 3.6.
- Watch YouTube: Reporting - CompTIA Security+ SY0-401: 3.6.
- Watch YouTube: Detection vs. Prevention - CompTIA Security+ SY0-401: 3.6.
References
This article is issued from Wikiversity - version of the Sunday, December 13, 2015. The text is available under the Creative Commons Attribution/Share Alike but additional terms may apply for the media files.