Information Security: Subnetting & DNS for Security Architects

IT Security    |    Beginner
  • 11 Videos | 1h 9m 59s
  • Includes Assessment
  • Earns a Badge
Likes 15 Likes 15
In this 11-video course, learners will discover key concepts related to subnetting, virtual machines (VMs), container, and DNS (domain name system) security. Examine tips and tricks used in subnetting and subnetting advantages. Explore classless inter-domain routing (CIDR), notation, deployment and security considerations for VMs and containers, and types of DNS attacks and mitigation strategies. You will begin the course by taking a look at the importance of subnetting, how it relates to security, and its advantages and disadvantages. Then move on to defining the CIDR notation. You will examine the subnetting cheat sheet, and learn various subnetting tips and tricks; compare VMs and containers, and examine the deployment considerations for VMs and containers. Next, learners will observe the best practices for deploying VMs, and the best practices for VM and container security. In the final two tutorials of this course, you will discover the various types of DNS attacks and their mitigations, and the various types of subnetting attacks and mitigations.

WHAT YOU WILL LEARN

  • introduce the key concepts of the course
    describe subnetting and its advantages
    define the CIDR notation
    recognize subnetting tips and tricks
    compare VMs and containers
    describe the deployment considerations for virtual machines and containers
  • recognize best practices for deploying virtual machines
    recognize best practices for VM and container security
    describe the various types of DNS attacks and their mitigations
    recognize the various types of subnetting attacks and mitigations
    summarize the key concepts covered in this course

IN THIS COURSE

  • Playable
    1. 
    Course Overview
    1m 42s
    UP NEXT
  • Playable
    2. 
    Subnetting and its Advantages
    9m 10s
  • Locked
    3. 
    The CIDR Notation
    4m 51s
  • Locked
    4. 
    Tips and Tricks in Subnetting
    3m 19s
  • Locked
    5. 
    VMs and Containers
    11m 18s
  • Locked
    6. 
    Deployment Considerations for VMs and Containers
    2m 52s
  • Locked
    7. 
    Best Practices for Deploying VMs
    8m 24s
  • Locked
    8. 
    Best Practices for VM and Container Security
    12m 7s
  • Locked
    9. 
    Types of DNS Attacks and their Mitigations
    7m 50s
  • Locked
    10. 
    Types of Subnetting Attacks and Mitigations
    3m 1s
  • Locked
    11. 
    Course Summary
    57s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Likes 10 Likes 10  
Likes 17 Likes 17  

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Likes 161 Likes 161  
Likes 362 Likes 362