CompTIA Cybersecurity Analyst+: Firewalls & Intrusion Detection

Cybersecurity    |    Intermediate
  • 10 videos | 56m 22s
  • Includes Assessment
  • Earns a Badge
Rating 5.0 of 2 users Rating 5.0 of 2 users (2)
Firewall solutions control which types of network traffic are allowed into, through, or to leave a host or network. Cybersecurity analysts must know which type of firewall is needed for a given requirement as well as the placement of the firewall solution on the network. In this course, you will begin with a comparison of firewall types such as packet filtering, next-generation, and web application firewalls and learn how to determine their placement on the network. Then you will configure Windows Defender and Linux firewall settings. Next, you will configure Azure network security group firewall rules and explore the role played by forward and reverse proxy servers. Finally, you will install the Squid proxy server on Linux, find out how intrusion detection and prevention systems can address security concerns, and install and configure the Snort IDS. This course can be used to prepare for the CS0-003: CompTIA Cybersecurity Analyst+ exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Outline the different types of firewalls, including next-generation firewall (ngfw) and web application firewall (waf), their placement, such as in the demilitarized zone (dmz), and when they should be used
    Configure windows defender firewall settings
    Configure linux network firewall settings
    Configure firewall rules in an azure network security group
  • Describe the role played by forward and reverse proxy servers
    Install the squid proxy server on linux
    Provide an overview of how intrusion detection systems (idss) and intrusion prevention systems (ipss) solutions address security issues
    Install and configure the snort ids tool
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 16s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 8m 35s
    After completing this video, you will be able to outline the different types of firewalls, including next-generation firewall (NGFW) and web application firewall (WAF), their placement, such as in the demilitarized zone (DMZ), and when they should be used. FREE ACCESS
  • Locked
    3.  Managing Windows Defender Firewall
    6m 16s
    Learn how to configure Windows Defender firewall settings. FREE ACCESS
  • Locked
    4.  Managing a Linux Firewall
    6m 23s
    Find out how to configure Linux network firewall settings. FREE ACCESS
  • Locked
    5.  Managing Cloud Firewalls
    6m 16s
    Discover how to configure firewall rules in an Azure Network Security Group. FREE ACCESS
  • Locked
    6.  Proxy Servers
    7m 32s
    Upon completion of this video, you will be able to describe the role played by forward and reverse proxy servers. FREE ACCESS
  • Locked
    7.  Deploying the Squid Proxy Server
    6m 30s
    In this video, find out how to install the Squid proxy server on Linux. FREE ACCESS
  • Locked
    8.  Intrusion Detection and Prevention
    6m 44s
    After completing this video, you will be able to provide an overview of how intrusion detection systems (IDSs) and intrusion prevention systems (IPSs) solutions address security issues. FREE ACCESS
  • Locked
    9.  Configuring the Snort IDS
    6m 1s
    During this video, you will learn how to install and configure the Snort IDS tool. FREE ACCESS
  • Locked
    10.  Course Summary
    50s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 7 users Rating 4.6 of 7 users (7)
Rating 4.6 of 30 users Rating 4.6 of 30 users (30)
Rating 5.0 of 5 users Rating 5.0 of 5 users (5)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 5.0 of 2 users Rating 5.0 of 2 users (2)
Rating 4.8 of 61 users Rating 4.8 of 61 users (61)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)