System administrators are responsible for the configuration of operating systems to meet an organization’s security control requirements. In this video, learn about the concept of operating system hardening, including managing security settings, patch management, and trusted operating systems.
- [Announcer] System administrators are responsible…for the configuration of operating systems…to meet an organization's security control requirements.…This is an extremely important responsibility,…because attackers can often exploit security vulnerabilities…to gain access to a vulnerable system,…and then even potentially leverage that access…to compromise an entire network.…Let's take a look at three important…operating system security issues:…security settings, patch management,…and trusted operating systems.…
There are many different security settings…in any operating system that you can customize…to meet the security needs of your organization.…You'll want to establish a security baseline…for your organization that includes the settings…important in your environment.…One of these is limiting the access that users have…to administrative resources because this level of access…can result in security compromises.…Let's take a look at how to limit administrative access…on a Windows system.…Here I am on the desktop of a Windows system.…
Note: This course is part of a series releasing throughout 2018. A completed learning path of the series will be available once all the courses are released.
- How IP addresses are assigned and managed
- Multilayer protocols
- VPNs and VPN concentrators
- Designing secure networks
- Firewall management techniques
- Maintaining network availability
- Software defined networking (SDN)
- Port isolation
- Network attacks
- How Wi-Fi networks function
- WPA, WPS, and propagation attacks
- Host-based network security control
Skill Level Advanced
Insights from a Cybersecurity Professionalwith Mike Chapple32m 15s Appropriate for all
1. TCP/IP Networking
2. Network Security Devices
3. Designing Secure Networks
4. Specialized Networking
5. Secure Network Management
6. Virtualized Networks
Port isolation1m 47s
7. Network Attacks
8. Transport Encryption
9. Wireless Networking
10. Host Security
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.