CISM 2022: Network Security

CISM    |    Intermediate
  • 11 videos | 1h 10m 36s
  • Includes Assessment
  • Earns a Badge
Rating 4.8 of 17 users Rating 4.8 of 17 users (17)
Organizations should secure resource access while remaining compliant with relevant laws and regulations. One of the many ways to do this is to ensure proper network security controls are in place and reviewed regularly. In this course, examine the OSI model layers and their relevance to network security controls, as well as the security aspects of network switching and network access control. Next, explore DHCP and DNS security issues and Wi-Fi authentication methods, and discover how to harden a DHCP and DNS deployment on Windows Server. Finally, learn the importance of using honeypots and honeynets, and how to implement a honeypot and analyze captured network traffic. This course can be used to prepare for the Certified Information Security Manager (CISM) exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    List the main characteristics of each osi layer
    Outline how network switching works, including the use of vlans
    Create a vmware workstation disconnected virtual network switch
    State the security aspects of dhcp and dns usage
    Harden dhcp and dns services
  • List various ways to authenticate to a wi-fi network
    Recognize where honeypots and honeynets can be used to monitor malicious traffic
    Implement and configure a honeypot
    Open and analyze a packet capture using wireshark
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 25s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 11m 31s
    Upon completion of this video, you will be able to list the main characteristics of each OSI layer. FREE ACCESS
  • Locked
    3.  Network Switching and Network Access Control
    7m 8s
    After completing this video, you will be able to outline how network switching works, including the use of VLANs. FREE ACCESS
  • Locked
    4.  Creating a Virtualization Sandbox
    6m 40s
    Discover how to create a VMware Workstation disconnected virtual network switch. FREE ACCESS
  • Locked
    5.  DHCP and DNS Security
    10m 33s
    In this video, we will state the security aspects of DHCP and DNS usage. FREE ACCESS
  • Locked
    6.  Implementing DHCP and DNS Security
    7m 25s
    Learn how to harden DHCP and DNS services. FREE ACCESS
  • Locked
    7.  Wi-Fi Authentication Methods
    7m 45s
    After completing this video, you will be able to list various ways to authenticate to a Wi-Fi network. FREE ACCESS
  • Locked
    8.  Honeypots and Honeynets
    6m 14s
    In this video, you will recognize where honeypots and honeynets can be used to monitor malicious traffic. FREE ACCESS
  • Locked
    9.  Implementing a Honeypot
    5m 5s
    In this video, find out how to implement and configure a honeypot. FREE ACCESS
  • Locked
    10.  Analyzing Captured Network Traffic
    5m 47s
    During this video, discover how to open and analyze a packet capture using Wireshark. FREE ACCESS
  • Locked
    11.  Course Summary
    1m 2s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 30 users Rating 4.6 of 30 users (30)
Rating 4.7 of 16 users Rating 4.7 of 16 users (16)
Rating 4.9 of 12 users Rating 4.9 of 12 users (12)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.8 of 4 users Rating 4.8 of 4 users (4)
Rating 4.8 of 21 users Rating 4.8 of 21 users (21)
Rating 4.7 of 9 users Rating 4.7 of 9 users (9)