HDI Conference & Expo is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Browse, filter, and select your list of sessions and activities. You can plan your schedule in advance and access it before and during the show via export or the conference app. This tool is provided for your convenience and does not guarantee admission to the sessions you select. Adding a session to your schedule does not register you for any preconference training or workshops.

Pre-13: Security Fundamentals for the Support Center

James Stanger (Chief Technology Evangelist, CompTIA)

Stephen Schneiter (Program Manager , CompTIA)

Location: Panzacola H-3

Date: Tuesday, April 9

Time: 9:00am - 3:30pm

Pass Type: Conference Workshop, Conference and Expo Package - Get your pass now!

Track: 1-Day Preconference Workshop, Service Management

Vault Recording: TBD

Audience Level: Intermediate

The technical support worker is now being asked to work with cybersecurity professionals on the “front line” to help defend their organization. What are the skills that today’s technical support worker needs to support cybersecurity professionals? Join CompTIA’s Dr. James Stanger and Stephen Schneiter to learn more about these skills in a full-day pre-conference workshop, where we’ll do more than just talk about these skills.

Stephen and James will be doing hands-on demonstrations of essential, practical skills that today’s technical support professional needs to know. They expect you to bring your own systems and follow along.
They’ll be going over essential steps for malware detection and removal. You’ll implement Secure Shell (SSH). You’ll also learn practical device monitoring and hardening techniques, as well as how to configure systems for two-factor authentication (2FA).

Along the way, James and Stephen will showcase various threats, including social engineering, and will discuss how to improve both physical and logical security.

So, please bring along your own notebook computers and mobile devices. To get the most out of this session, set up a virtualized environment using VMWare, VirtualBox, or any other virtualization environment. Populate it with at least two versions of Linux. James and Stephen use Ubuntu Linux, but you can use any flavor you wish.