Network Hardening, Network Segmentation, and Secure Connections

Cybersecurity    |    Beginner
  • 27 Videos | 1h 1m 37s
  • Includes Assessment
  • Earns a Badge
Network hardening can help identify potential vulnerabilities, secure systems, and reduce the risk of unauthorized access. In this course, you'll learn how to secure administrative and remote access connections. You'll discover key features of the Simple Network Management Protocol (SNMP) and explore the various types of firewalls and logical locations to place them on a network. Discover how to control and manage traffic using rules on routers and firewalls, and explore how firewall management can contribute to overall network hardening. Discover how to limit internal and external physical access to resources. Explore best practices for managing telecom and wiring closets as well as considerations for establishing secure access. Lastly, explore the importance of hardening wireless access points and recognize how to harden network elements including firewalls, routers, and access points.

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    discuss common calls received by help desk support
    discuss considerations when limiting remote admin access
    recognize key decisions when granting administrative access
    provide an overview of using AAA for accessing network devices
    recognize key features of the Simple Network Management Protocol (SNMP)
    discuss types of firewalls and logical locations to place them
    list the benefits of segmenting a network
    recognize how to control and manage traffic using rules on routers and firewalls
    discuss how firewall management relates to overall network hardening
    recognize how to disable discovery protocols
    discuss measures to manage resources in a wiring closet
    describe measures to limit internal physical access to resources
    discuss the importance of keeping a telecoms closets secured
  • discuss wiring closet flaws and how to avoid them
    harden networks by controlling network device ports
    describe measures to limit external physical access to resources
    describe considerations when establishing secure access
    list physical security considerations when performing network hardening
    recognize how and where to filter traffic on a network
    discuss the importance of hardening wireless access points
    use a utility to perform Wi-Fi scanning on a network
    list physical security concerns as they relate to wireless access points
    discuss hardening network elements including firewalls, routers, routers, and access points
    secure a network by changing default settings on all IT equipment
    summarize concepts and techniques used to provide device protection on a network
    recognize best practices as they relate to traffic filtering on a network

IN THIS COURSE