Video Description

This lesson focuses on host and applications security. Participants learn how to secure systems as well as applications and the threats they pose to a business environment. This lesson teaches about host hardening which consists of: - Using a trusted operating system - Standard operating environment - Implementing physical security best practices - Policy management - Industry and manufacturer best practices - Protecting against known vulnerabilities - Removing access to command shells and other high risk/unnecessary features - Warning banners Host hardening is about locking down a system as much as possible and being able to trust a processor, a memory and the operating system kernel. Companies want to give the appearance of being their networks so secure that when attackers want to cause damage, they decide it's not worth the effort.

Course Modules