Mitigating Security Risks: Managing Network & Infrastructure Security Risks

IT Security    |    Intermediate
  • 11 Videos | 1h 36m 41s
  • Includes Assessment
  • Earns a Badge
Likes 1 Likes 1
To mitigate cyber, data, cloud, and information security risks, you need solid knowledge of the complete network security process, from network design to continuous monitoring and logging. In this course, you'll explore some vital network security concepts and standard techniques for mitigating security risks. You'll start by examining the potential vulnerabilities in a network and how these turn into threats. You'll then explore the decisions you need to make to secure the network infrastructure. Next, you'll investigate different network zones and tools used for monitoring, detection, and logging. You'll finish by outlining a secure network design's characteristics and the recommended guidelines and best practices for network security. On completion of this course, you'll be able to plan for network and infrastructure-related security risks using recommended tools, methods, and best practices.

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    describe the network vulnerabilities that can turn into threats
    describe commonly used network vulnerability prevention methods
    illustrate using examples how a vulnerable network exposes the organization to cyber, data, cloud, and information security risks
    define network security
    list basic network zones and compare them in relation to security
  • describe the role of monitoring, detection, and logging
    list the tools that can be used for network security, keeping capabilities for monitoring, detection, and logging in mind
    recognize the characteristics of a secure network design for protecting networks and systems
    list the guidelines and best practices for network security
    summarize the key concepts covered in this course

IN THIS COURSE

  • Playable
    1. 
    Course Overview
    1m 42s
    UP NEXT
  • Playable
    2. 
    Network Vulnerabilities as Threats
    8m 5s
  • Locked
    3. 
    Network Vulnerability Prevention Methods
    9m 44s
  • Locked
    4. 
    Examples of Network Vulnerabilities
    8m 32s
  • Locked
    5. 
    The Purpose of Network Security
    12m 26s
  • Locked
    6. 
    Network Zones and Security
    10m 42s
  • Locked
    7. 
    Monitoring, Detection, and Logging
    5m 30s
  • Locked
    8. 
    Tools for Monitoring, Detection, and Logging
    6m 25s
  • Locked
    9. 
    Characteristics of a Secure Network Design
    12m 10s
  • Locked
    10. 
    Guidelines and Best Practices for Network Security
    15m 39s
  • Locked
    11. 
    Course Summary
    1m 16s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.