www.howtonetwork.org

CCNA & CCNP Certifcation Training

  • About
  • Contact
  • FAQ
  • Join
  • Home
  • CCNA
    • ICND1
    • ICND2
    • 101 CCNA LABS
  • CCNP
    • ROUTE
    • SWITCH
    • TSHOOT
    • 101 CCNP LABS
  • CompTIA
    • Security+
    • Network+
  • Design
    • CCDA
    • CCDP
You are here: Home / CompTIA / Security+ / Chapter 4: Application, Data, and Host Security / Appropriate Procedures to Establish Host Security

Appropriate Procedures to Establish Host Security

Application security can help to close some of the doors that might provide access to a system. Unfortunately, those applications, however secure, have to run on a host that may also be vulnerable to attack. Fortunately, there are a number of steps that may be taken to increase the security of the hosts the applications rely on. This section will cover the following topics:

  • Operating system security and settings
  • Anti-malware
  • Patch management
  • Hardware security
  • Host software baselining
  • Mobile devices
  • Virtualization

 

Operating System . . .

The content below this message is for members only.

About Us

This is a free bonus site for members of www.howtonetwork.com

Copyright

The content on this copyright Reality Press Ltd.
Copyright Reality Press Ltd.