Information Security: Subnetting & DNS for Security Architects

IT Security
  • 11 Videos | 1h 6m 2s
  • Includes Assessment
  • Earns a Badge
Likes 9
In this 11-video course, learners will discover key concepts related to subnetting, virtual machines (VMs), container, and DNS (domain name system) security. Examine tips and tricks used in subnetting and subnetting advantages. Explore classless inter-domain routing (CIDR), notation, deployment and security considerations for VMs and containers, and types of DNS attacks and mitigation strategies. You will begin the course by taking a look at the importance of subnetting, how it relates to security, and its advantages and disadvantages. Then move on to defining the CIDR notation. You will examine the subnetting cheat sheet, and learn various subnetting tips and tricks; compare VMs and containers, and examine the deployment considerations for VMs and containers. Next, learners will observe the best practices for deploying VMs, and the best practices for VM and container security. In the final two tutorials of this course, you will discover the various types of DNS attacks and their mitigations, and the various types of subnetting attacks and mitigations.

WHAT YOU WILL LEARN

  • introduce the key concepts of the course
    describe subnetting and its advantages
    define the CIDR notation
    recognize subnetting tips and tricks
    compare VMs and containers
    describe the deployment considerations for virtual machines and containers
  • recognize best practices for deploying virtual machines
    recognize best practices for VM and container security
    describe the various types of DNS attacks and their mitigations
    recognize the various types of subnetting attacks and mitigations
    summarize the key concepts covered in this course

IN THIS COURSE

  • Playable
    1. 
    Course Overview
    1m 45s
    UP NEXT
  • Playable
    2. 
    Subnetting and its Advantages
    9m 13s
  • Locked
    3. 
    The CIDR Notation
    4m 54s
  • Locked
    4. 
    Tips and Tricks in Subnetting
    3m 22s
  • Locked
    5. 
    VMs and Containers
    11m 21s
  • Locked
    6. 
    Deployment Considerations for VMs and Containers
    2m 55s
  • Locked
    7. 
    Best Practices for Deploying VMs
    8m 27s
  • Locked
    8. 
    Best Practices for VM and Container Security
    12m 10s
  • Locked
    9. 
    Types of DNS Attacks and their Mitigations
    7m 53s
  • Locked
    10. 
    Types of Subnetting Attacks and Mitigations
    3m 4s
  • Locked
    11. 
    Course Summary
    1m

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE