Video Description

This lesson discusses system hardening and base lining; which consists of the following steps: • Removing unnecessary devices • Installing the latest service packs and patches • Renaming default accounts • Changing default settings • Enabling security configurations like auditing, firewalls and updates • Remember: Physical security too! ISC2 defines configuration management as a 'process of identifying and documenting hardware components, software and the associated settings. Participants also learn about the principles and process of change management as well as patch management, which is an essential component in change management.

Course Modules

ISC2 CISSP - Archive