Hardening Computing Resources (Part 1) (Domain 4)
Hardening is the practice of stripping down systems to only what they need to function securely, and this episode focuses on doing just that for mobile devices, workstations, switches, and routers. These devices often serve as entry points for attackers, especially when defaults are left in place, unnecessary services are running, or updates are neglected. We cover basic but essential steps such as disabling unused ports, updating firmware, removing bloatware, enforcing screen locks, and deploying mobile device management (MDM) policies. On the network side, we explore how to harden switches and routers by securing management interfaces, disabling insecure protocols like Telnet, and applying access control lists. Whether it's a BYOD smartphone or a core switch, each resource needs a security baseline tailored to its function and risk profile. The result is a more manageable and less vulnerable computing environment that can resist both external and internal threats.
