Did you know Cybrary's video training is FREE? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
This lesson discusses system hardening and base lining; which consists of the following steps: • Removing unnecessary devices • Installing the latest service packs and patches • Renaming default accounts • Changing default settings • Enabling security configurations like auditing, firewalls and updates • Remember: Physical security too! ISC2 defines configuration management as a 'process of identifying and documenting hardware components, software and the associated settings. Participants also learn about the principles and process of change management as well as patch management, which is an essential component in change management.