Securing Computing Resources

Welcome to the Securing Computing Resources practice lab. In this module, you will be provided with the instructions and devices needed to develop your hands-on skills.

Securing computing resources ensures the confidentiality, integrity, and availability of data and resources. It includes practices such as implementing security policies, vulnerability management, network security, and access control.

In this module, you will explore securing computing resources through the establishment of a baseline in performance monitor, exploring input validation in a web application, and installing and using a sandbox.

Overview

Learning Outcomes:

In this module, you will complete the following exercises:

  • Exercise 1 - Establish a Baseline
  • Exercise 2 - Input Validation
  • Exercise 3 - Sandboxing

After completing this module, you should be able to:

  • Configure a baseline.
  • Capture a baseline.
  • View cookie parameters.
  • Explore input validation code.
  • Test input validation.
  • Install Sandboxie Plus.
  • Use and observe Sandboxie Plus.

Exam Objectives:

The following exam objective is covered in this module:

4.1 Given a scenario, apply common security techniques to computing resources

  • Secure baselines
  • Application security
  • Sandboxing