Security for CompTIA A+ (220-902)

This course covers every objective in the Security domain of the CompTIA A+ 220-902 certification exam.
Course info
Rating
(27)
Level
Beginner
Updated
Dec 16, 2015
Duration
4h 31m
Table of contents
Common Security Threats and Vulnerabilities
Common Prevention Methods
Windows OS Security Settings
Securing Workstations
Securing Mobile Devices
Data Destruction and Disposal Methods
Securing SOHO Wireless and Wired Networks
Description
Course info
Rating
(27)
Level
Beginner
Updated
Dec 16, 2015
Duration
4h 31m
Description

This course covers every objective in the Security domain of the CompTIA A+ 220-902 certification exam. This is the fourth course in a series of six courses to prepare you for the CompTIA A+ 220-902 certification exam.

About the author
About the author

Timothy Warner is a Microsoft Most Valuable Professional (MVP) in Cloud and Datacenter Management who is based in Nashville, TN.

More from the author
More courses by Tim Warner
Section Introduction Transcripts
Section Introduction Transcripts

Common Prevention Methods
Hello there, and welcome to Pluralsight. My name is Tim Warner, I'm your instructor, and this module is entitled Common Prevention Methods. Here's our learning path for the CompTIA A+ (220-902) certification exam. We begin with a brief introduction to the series, and then each subsequent course, Windows OS, other operating systems, security, that's where we are presently, software troubleshooting, and operational procedures all are derived directly from the 220-902 objective blueprint. Check the course notes for this module, and look for the relevant links there. I have six modules for you in the security course, the first of which was called Common Security Threats and Vulnerabilities. Today we're covering Common Prevention Methods, then we do Windows OS Security Settings, Securing Mobile Devices, Data Destruction and Disposal Methods, and finally Secure SOHO Wireless and Wired Networks. Now Common Prevention Methods is a pretty generic module title. What exactly are we preventing? We're preventing data loss. This is information security that we're concerned with here, and we're going to start at the physical layer. No, this isn't OSI layer 1 in the networking schema. I'm talking honest-to-goodness physical security like doors and locks. Think of it this way. A malicious individual is not going to be able to get their hands physically on confidential data unless they can overcome your physical security. We'll spend an equal or greater amount of time covering digital security and also the crucial importance of user education. Let's get started.

Securing SOHO Wireless and Wired Networks
Hello, and welcome to Pluralsight. My name is Tim Warner, and this module is entitled Securing SOHO Wireless and Wired Networks. Our learning path for the CompTIA A+ (220-902) certification exam works as follows: We have a brief course that introduces you to the series, and then each subsequent course, Windows OS, Other Operating Systems, Security, which we're finishing up today, Software Troubleshooting, and Operational Procedures, all map to each content domain in the CompTIA published objectives. Check the exercise files for the module, and you will see a link to those objectives. This is actually the final module in the Security course. You've come a long way if you've been with me throughout the whole course. We began with Common Security Threats and Vulnerabilities, then we went into Common Prevention Methods, Windows Security Settings, Securing Workstations, Securing Mobile Devices, Data Destruction and Disposal Methods, and here we are with SOHO Networking. I have three main learning goals for us here. First of all, I want you to understand what SOHO means. It's one thing to understand the acronym, that it stands for small office/home office. It's another thing to put that four letter acronym in its proper context. How does a SOHO network differ from a small, medium, or large enterprise business? So we'll take care of those preliminaries. And once we've done that, we'll get into the so-called meat and potatoes. I'm going to share the general principles of securing both wireless 802-11 Wi-Fi networks, as well as wired Ethernet. Each has its own particular challenges. With that, we have a lot to cover, so with no further ado let's get started.