Mitigation Techniques

  • 13 Videos | 1h 26m 19s
  • Includes Assessment
  • Earns a Badge
Likes 34 Likes 34
Mitigating security threats can lessen the overall impact that an attack can have on network devices, hosts, and applications. Explore common mitigation techniques.

WHAT YOU WILL LEARN

  • describe signature management
    describe device and host hardening
    recognize when to change native VLANs
    recognize switch port configuration using the Spanning Tree Protocol, BPDU guard, and root guard
    recognize switch port protection such as ARP poisoning, DHCP snooping, and MAC filtering
    describe network segmentation techniques such as DMZ and VLAN
    understand when to use privileged user accounts
  • describe file integrity
    describe role separation
    recognize when to use access control lists
    describe honeypots
    recognize the benefits of penetration testing
    implement mitigation techniques

IN THIS COURSE

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Likes 0 Likes 0  
CHANNEL Cisco Switching
Likes 55 Likes 55  

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Likes 43 Likes 43  
Likes 48 Likes 48  
Likes 41 Likes 41