Mitigation Techniques
Intermediate
- 13 Videos | 1h 20m 19s
- Includes Assessment
- Earns a Badge
Mitigating security threats can lessen the overall impact that an attack can have on network devices, hosts, and applications. Explore common mitigation techniques
WHAT YOU WILL LEARN
-
describe signature managementdescribe device and host hardeningrecognize when to change native VLANsrecognize switch port configuration using the Spanning Tree Protocol, BPDU guard, and root guardrecognize switch port protection such as ARP poisoning, DHCP snooping, and MAC filteringdescribe network segmentation techniques such as DMZ and VLANunderstand when to use privileged user accounts
-
describe file integritydescribe role separationrecognize when to use access control listsdescribe honeypotsrecognize the benefits of penetration testingimplement mitigation techniques
IN THIS COURSE
-
1.Signature Management6m 47sUP NEXT
-
2.Device and Host Hardening5m 28s
-
3.VLAN5m 12s
-
4.Switch Port Configuration6m 10s
-
5.Switch Port Protection6m 6s
-
6.Network Segmentation8m 44s
-
7.Privileged User Accounts8m 55s
-
8.File Integrity5m 42s
-
9.Role Separation5m 20s
-
10.Access Control Lists7m 44s
-
11.Honeypots6m 16s
-
12.Penetration Testing4m 33s
-
13.Exercise: Use Mitigation Techniques3m 24s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.