Mitigating Security Risks: Managing Network & Infrastructure Security Risks
IT Security
| Intermediate
- 11 Videos | 1h 32m 11s
- Includes Assessment
- Earns a Badge
To mitigate cyber, data, cloud, and information security risks, you need solid knowledge of the complete network security process, from network design to continuous monitoring and logging. In this course, you'll explore some vital network security concepts and standard techniques for mitigating security risks. You'll start by examining the potential vulnerabilities in a network and how these turn into threats. You'll then explore the decisions you need to make to secure the network infrastructure. Next, you'll investigate different network zones and tools used for monitoring, detection, and logging. You'll finish by outlining a secure network design's characteristics and the recommended guidelines and best practices for network security. On completion of this course, you'll be able to plan for network and infrastructure-related security risks using recommended tools, methods, and best practices.
WHAT YOU WILL LEARN
-
discover the key concepts covered in this coursedescribe the network vulnerabilities that can turn into threatsdescribe commonly used network vulnerability prevention methodsillustrate using examples how a vulnerable network exposes the organization to cyber, data, cloud, and information security risksdefine network securitylist basic network zones and compare them in relation to security
-
describe the role of monitoring, detection, and logginglist the tools that can be used for network security, keeping capabilities for monitoring, detection, and logging in mindrecognize the characteristics of a secure network design for protecting networks and systemslist the guidelines and best practices for network securitysummarize the key concepts covered in this course
IN THIS COURSE
-
1.Course Overview1m 42sUP NEXT
-
2.Network Vulnerabilities as Threats8m 5s
-
3.Network Vulnerability Prevention Methods9m 44s
-
4.Examples of Network Vulnerabilities8m 32s
-
5.The Purpose of Network Security12m 26s
-
6.Network Zones and Security10m 42s
-
7.Monitoring, Detection, and Logging5m 30s
-
8.Tools for Monitoring, Detection, and Logging6m 25s
-
9.Characteristics of a Secure Network Design12m 10s
-
10.Guidelines and Best Practices for Network Security15m 39s
-
11.Course Summary1m 16s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.