5910 Breckenridge Pkwy Suite B, Tampa, FL. 33610
(800) 272-0707

SkillSoft Explore Course

IT Professional Certifications     CompTIA     CompTIA Server+ Certification     SK0-004 CompTIA Server+ 2015
Because so much work is done electronically, businesses and governments generate vast amounts of information, most of which needs to be safe. Security technologies have improved with the growth of data requirements. This course introduces the methods and concepts involved in physically protecting this data. As well, you'll learn about the different server hardening techniques, the different types of network security systems and protocols, as well as logical access control methods. This course also covers how to securely dispose storage and how to implement proper environmental controls in your server room. This course is one of a series in the learning path that maps to CompTIA's Server+ exam, SK0-004, and covers the following exam objectives: 4.1 Compare and contrast physical security methods and concepts, 4.2 Given a scenario, apply server hardening techniques, 4.3 Explain basic network security systems and protocols, 4.4 Implement logical access control methods based on company policy, 4.5 Implement data security methods and secure storage disposal techniques, and 4.6 Given a scenario, implement proper environmental controls and techniques.

Objectives

Physical Security Methods and Concepts

  • start the course
  • compare and contrast multifactor authentication methods and concepts
  • compare and contrast physical security methods and concepts
  • compare and contrast additional physical security methods and concepts

Server Hardening Techniques

  • apply OS hardening techniques
  • apply application hardening techniques
  • apply endpoint security techniques
  • recognize remediate security issues based on vulnerability scan
  • apply hardware hardening techniques

Basic Network Security Systems and Protocols

  • describe a network-based and host-based firewall
  • describe 802.1x and NAC port security
  • describe what a router access list is and how it helps secure network security systems
  • describe a network intrusion detection system (NIDS)
  • identify and explain the different authentication protocols
  • describe the public key infrastructure process
  • describe a VPN, IPSEC, and VLAN
  • distinguish between the different security zones including DMZ, public versus private, and intranet versus extranet

Logical Access Control Methods

  • implement access control lists user, groups, and roles
  • recognize access control list resource methods
  • recognize access control list permission statements

Data Security Methods and Storage Disposal

  • implement data security methods
  • implement secure storage disposal techniques

Environmental Controls and Techniques

  • implement proper power concepts and use best practices
  • implement proper power distribution concepts and use best practices
  • describe capacity planning concepts
  • describe multiple circuit concepts
  • implement proper safety controls and techniques
  • implement proper additional safety controls and techniques
  • implement proper environmental controls and techniques

Practice: Implementing Security

  • understand the options available for securing the server environment