Course Details

Previous Page


Mitigation Techniques


Overview/Description
Target Audience
Prerequisites
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description
Mitigating security threats can lessen the overall impact that an attack can have on network devices, hosts, and applications. In this course, you'll explore common mitigation techniques, as you prepare for exam N10-007.

Target Audience
Network administrators, network technicians, network installers, helpdesk technicians, IT cable installers, and any other professionals working with computer networks

Prerequisites
None

Expected Duration (hours)
1.5

Lesson Objectives

Mitigation Techniques

  • start the course
  • describe signature management
  • describe device and host hardening
  • recognize when to change native VLANs
  • recognize switch port configuration using the Spanning Tree Protocol, BPDU guard, and root guard
  • recognize switch port protection such as ARP poisoning, DHCP snooping, and MAC filtering
  • describe network segmentation techniques such as DMZ and VLAN
  • understand when to use privileged user accounts
  • describe file integrity
  • describe role separation
  • recognize when to use access control lists
  • describe honeypots
  • recognize the benefits of penetration testing
  • implement mitigation techniques
  • Course Number:
    cs_ctnp_a12_it_enus

    Expertise Level
    Intermediate