Premium Subscription

Brighten your day with 250+ courses

Learn MorePurchase

Security: Advanced Fortifications

Course Introduction

01 The Reality of Data Security 6 m

Data Security: In-Transit

02 The Insecurity of Network Communication 10 m
03 Using Wireshark to Read Network Traffic 6 m
04 Understanding Encryption 5 m
05 Modern Encryption 7 m
06 Public Key Infrastructure (PKI) and Digital Certificates 8 m
07 Applying Encryption to OnBase Systems 3 m
08 Applying Encryption Knowledge Check 3 m
09 Encrypting Web Traffic 8 m
10 Encrypting Database Traffic 7 m
11 Encrypting File-Access Traffic 3 m

Data Security: At-Rest

12 The Insecurity of Idle Data 2 m
13 Encrypted Disk Groups 4 m
14 Encrypted Keywords 2 m
15 Encrypted Alpha Numeric Keywords 6 m

User Security: Authentication

16 Setting Up Integrated Authentication for Active Directory 7 m
17 Creating Secure Password Policies 4 m
18 Creating & Modifying Password Policies 4 m

User Security: Authorization

19 Accounts, Permissions & Privileges 5 m
20 Security Keywords 2 m
21 Configuring Security Keywords 3 m
22 Disk Group Access 6 m
23 Enabling Identity Impersonation on an Application Server 4 m
24 Protecting Disk Group Access with Distributed Disk Services 7 m
25 Further Learning: Users & User Groups Hands-on Lab 1 m

User Security: Accountability

26 Leveraging Document History & Transaction Logs 5 m
27 Generating Verbose Logs Through the Archiving Configuration Activity 3 m
28 Generating SYS Configuration Reports 3 m
29 Course Conclusion & Resources 1 m

Final Assessment

30 Final Assessment 10 m

Security does not stop at the user interface. Software relies on network protocols that could be vulnerable. This course will help you better understand your system’s vulnerabilities and empower you to know and configure the mechanisms necessary to protect your network protocols.

Who should take this course?
This course is designed for the intermediate level OnBase System Administrator. It is recommended that you have completed System Administration (ILT) or you have comparable on-the-job experience with OnBase administrative functions.

  • OnBase
  • eLearning
  • P1692
  • Intermediate
  • 2 hrs 25 mins
  • Available with Premium Subscription

Please login to begin this course.


Prerequisites
There are no prerequisites for this course.
Topics Covered
  • Network Vulnerabilities
  • Packet sniffers or protocol analyzers
  • Modern Encryption
  • RSA and AES Encryption
  • Transport Layer Security (TLS)
  • Public Key Infrastructure (PKI)
  • Digital Certificates
  • HTTP Encryption
  • Encrypting File-Access on Network Shares
  • Distributed Disk Services
  • Encrypted Alpha Keywords
  • Default Accounts Best Practices
  • User Group Rights
  • Override Privileges
  • Security Keywords