From the course: CompTIA Advanced Security Practitioner (CASP+) (CAS-004) Cert Prep
Emerging technology
From the course: CompTIA Advanced Security Practitioner (CASP+) (CAS-004) Cert Prep
Emerging technology
- In this section of the course, we're going to discuss some emerging technologies. Throughout this section, we're going to be focused on Domain 1, Security Architecture, and specifically, Objective 1.8, that states that you must explain the impact of emerging technologies on enterprise security and privacy. Your organization is constantly being exposed to new threats and technology trends, every single day. As a cybersecurity professional, it is your job to keep up with them, understand how to address them, and understand how to get ahead of new and disruptive technologies, that are constantly being released into the industry. It seems like not a single day goes by, that we don't see some news about a newly discovered threat or exploit that's being used against our networks. Whether it's a new type of ransomware, a buffer overflow attack, or simply a different social engineering technique, threats are constantly evolving in an effort to get around our defenses. One way that we can keep up with all the latest emerging threats is to use Threat Intelligence. Now, Threat Intelligence helps organizations with gaining knowledge about new risks and exploits that are being used across the industry. Open-source and commercial-based Threat Intelligence are also going to be available in the marketplace. Now, Threat Intelligence organizations have been designed to find the trends in that data from a wide variety of sensors across the internet, and across the organizations that they're contracted to help protect. With this large amount of data at their disposal, these specialized Threat Intelligence organizations can usually spot the emerging threats and emerging trends before a single cybersecurity professional, like you or I really could. Now, disruptive technologies are going to exist in every industry. For example, if we look back over the last 10 years or so, we saw companies like Uber and Lyft that caused a huge disruption to the traditional taxi cab marketplace. Online training is another disruptive technology, and it's displaced many traditional certification bootcamp style providers from the technical training industry. Many of these disruptive technologies though, are really focused on being revolutionary and getting to the marketplace first. Now, sometimes this can be at the detriment of security. Security takes time, effort, and resources to achieve. If your organization is looking at adopting a disruptive technology, you should first do a proper security assessment of that technology. Over the next couple of years, there's going to be a lot of disruptive technologies out there affecting our organizations. For example, there's the upgrading of our cellular networks from 4G to 5G wireless, with its increased speeds and always-on connections. We have Machine Learning, Big Data, and Artificial Intelligence, that will all become commonplace throughout the organizations as well. A large movement has already begun to occur towards mobility, with a focus of bringing your own device initiatives, taking place at many organizations. As we look towards these disruptive technologies and their impact, it's important to identify security trends. A few trends have already begun to emerge that are going to continue into the next several years and decades. This includes the use of blockchain technology and security, automated threat-seeking artificial intelligence bots, behavioral analytics for system protection, and the move towards securing the Internet of Things. Many organizations have also begun to adopt a zero-trust model. This is where an organization has a highly-defensible posture, and essentially trusts no one, either internal or external to their organization. So, in this section, we're going to explore some of the newer, more modern technologies that are used in IT and the cybersecurity industries, and how this can affect our organizations and our enterprise networks. First, we're going to explore Artificial Intelligence and Machine Learning, also known as AI and ML, and the differences between these two. Next, we're going to take a look at Deep learning, which is a class of Machine Learning algorithms that use multiple layers to extract higher-level features from different types of raw data input. Then we'll move into Big data, which is a term used to describe extremely large and hard to manage amounts of data. This data can either be structured or unstructured data that your organization needs to process and extract information from, so that it can make sense of all the data it collects on a given topic area. Next, we'll move into our coverage of the Blockchain, and distributed consensus and their business applications, then we're going to jump into Advanced authentication and Advanced encryption. After that, we'll explore virtual and augmented reality technologies, as well as 3D printing, nanotechnology, and finally, quantum computing. As you can see, we have a lot of different topics and technologies to cover in this section of the course, so let's jump right into our discussion of the different emerging technologies that might be utilized within your security architectures. (logo reverberates)
Download courses and learn on the go
Watch courses on your mobile device without an internet connection. Download courses using your iOS or Android LinkedIn Learning app.
Contents
-
-
Securing networks6m 48s
-
Switches7m 27s
-
(Locked)
Routers8m 27s
-
(Locked)
Wireless and mesh3m 23s
-
(Locked)
Firewalls11m 30s
-
(Locked)
Proxies6m 59s
-
(Locked)
Gateways4m 39s
-
(Locked)
IDS and IPS6m 29s
-
(Locked)
Network access control2m 56s
-
(Locked)
Remote access8m 59s
-
(Locked)
Unified communication19m 8s
-
(Locked)
Cloud vs. on-premises4m 49s
-
(Locked)
DNSSEC4m 16s
-
(Locked)
Load balancer6m 48s
-
-
-
Securing architectures1m 16s
-
Traffic mirroring4m 23s
-
(Locked)
Network sensors11m 46s
-
(Locked)
Host sensors6m 15s
-
(Locked)
Layer 2 segmentation5m 14s
-
(Locked)
Network segmentation13m 14s
-
(Locked)
Server segmentation10m 51s
-
(Locked)
Zero trust6m 37s
-
(Locked)
Merging networks5m 32s
-
(Locked)
Software-defined networking5m 27s
-
-
-
Cloud and virtualization1m 6s
-
Cloud deployment models4m 34s
-
(Locked)
Cloud service models5m 7s
-
(Locked)
Deployment considerations4m 57s
-
(Locked)
Provider limitations2m 59s
-
(Locked)
Extending controls5m 6s
-
(Locked)
Provisioning and deprovision2m 59s
-
(Locked)
Storage models5m 22s
-
(Locked)
Virtualization7m 56s
-
-
-
Authentication and authorization1m 44s
-
Access control4m 47s
-
(Locked)
Credential management4m 27s
-
(Locked)
Password policies8m 2s
-
(Locked)
Multifactor authentication8m 25s
-
(Locked)
Authentication protocols10m
-
(Locked)
Federation7m 2s
-
(Locked)
Root of trust4m 24s
-
(Locked)
Attestation2m 14s
-
(Locked)
Identity proofing3m 33s
-
-
-
Emerging technology4m 18s
-
Artificial intelligence and machine learning8m 55s
-
(Locked)
Deep learning8m 58s
-
(Locked)
Big data4m 40s
-
(Locked)
Blockchain distributed consensus5m 36s
-
(Locked)
Passwordless authentication5m 17s
-
(Locked)
Homomorphic encryption3m 37s
-
(Locked)
Virtual and augmented reality4m 32s
-
(Locked)
3D printing3m 3s
-
(Locked)
Quantum computing5m 34s
-
-
-
(Locked)
Threat and vulnerability management1m 56s
-
(Locked)
Threat intelligence6m 19s
-
(Locked)
Threat hunting6m 43s
-
(Locked)
Intelligence collection11m 9s
-
(Locked)
Threat actors9m 21s
-
(Locked)
Threat management frameworks12m 45s
-
(Locked)
Vulnerability management activities11m 44s
-
(Locked)
Security Content Automation Protocol7m 21s
-
(Locked)
-
-
(Locked)
Analyzing vulnerabilities1m 22s
-
(Locked)
Race conditions4m 58s
-
(Locked)
Buffer overflows12m 27s
-
(Locked)
Authentication and references5m 56s
-
(Locked)
Ciphers and certificates10m 46s
-
(Locked)
Improper headers6m 9s
-
(Locked)
Software composition9m 49s
-
(Locked)
Vulnerable web applications11m 45s
-
(Locked)
-
-
(Locked)
Attacking vulnerabilities1m 15s
-
(Locked)
Directory traversals9m 48s
-
(Locked)
Cross-Site Scripting (XSS)8m 59s
-
(Locked)
Cross-site request forgery (CSRF)7m 15s
-
(Locked)
SQL injections7m 5s
-
(Locked)
XML injections6m 29s
-
(Locked)
Other injection attacks4m 21s
-
(Locked)
Authentication bypass6m 45s
-
(Locked)
VM attacks4m 52s
-
(Locked)
Network Attacks11m 3s
-
(Locked)
Social engineering7m 15s
-
(Locked)
-
-
(Locked)
Enterprise mobility2m 36s
-
(Locked)
Enterprise mobility management9m 36s
-
(Locked)
WPA37m 20s
-
(Locked)
Connectivity options8m 48s
-
(Locked)
Security configurations8m 8s
-
(Locked)
DNS protection3m 15s
-
(Locked)
Deployment options4m 38s
-
(Locked)
Reconnaissance concerns8m
-
(Locked)
Mobile security7m 50s
-
(Locked)
-
-
(Locked)
Endpoint security controls2m 24s
-
(Locked)
Device hardening8m 30s
-
(Locked)
Patching4m 41s
-
(Locked)
Security settings5m 41s
-
(Locked)
Mandatory access controls (MAC)6m 44s
-
(Locked)
Secure boot5m 49s
-
(Locked)
Hardware encryption4m 48s
-
(Locked)
Endpoint protections9m 54s
-
(Locked)
Logging and monitoring6m 14s
-
(Locked)
Resiliency6m 4s
-
(Locked)
-
-
(Locked)
Cloud technologies2m 37s
-
(Locked)
Business continuity and disaster recovery7m 51s
-
(Locked)
Cloud encryption5m 23s
-
(Locked)
Serverless computing8m 54s
-
(Locked)
Software-defined networking (SDN)6m 52s
-
(Locked)
Log collection and analysis4m 22s
-
(Locked)
Cloud application security broker6m 16s
-
(Locked)
Cloud misconfigurations10m 57s
-
(Locked)
-
-
(Locked)
Asymmetric algorithms2m 11s
-
(Locked)
Using asymmetric algorithms9m 28s
-
(Locked)
SSL, TLS, and cipher suites8m 21s
-
(Locked)
S/MIME and SSH7m 27s
-
(Locked)
EAP5m 39s
-
(Locked)
IPSec14m 34s
-
(Locked)
Elliptic curve cryptography (ECC)3m 33s
-
(Locked)
Forward secrecy3m 35s
-
(Locked)
Authenticated encryption with associated data (AEAD)1m 53s
-
(Locked)
Key stretching4m 30s
-
(Locked)
-
-
(Locked)
Public key infrastructure4m 30s
-
(Locked)
PKI components10m 18s
-
(Locked)
Digital certificates7m 44s
-
(Locked)
Using digital certificates5m 40s
-
(Locked)
Trust models4m 28s
-
(Locked)
Certificate management2m 44s
-
(Locked)
Certificate validity: CRL and OCSP3m 48s
-
(Locked)
Protecting web traffic3m 30s
-
(Locked)
Troubleshooting certificates5m 22s
-
(Locked)
Troubleshooting keys3m 35s
-
(Locked)