Network Hardening, Network Segmentation, and Secure Connections
Cybersecurity
| Beginner
- 27 Videos | 1h 7s
- Includes Assessment
- Earns a Badge
Network hardening can help identify potential vulnerabilities, secure systems, and reduce the risk of unauthorized access. In this course, you'll learn how to secure administrative and remote access connections. You'll discover key features of the Simple Network Management Protocol (SNMP) and explore the various types of firewalls and logical locations to place them on a network. Discover how to control and manage traffic using rules on routers and firewalls, and explore how firewall management can contribute to overall network hardening. Discover how to limit internal and external physical access to resources. Explore best practices for managing telecom and wiring closets as well as considerations for establishing secure access. Lastly, explore the importance of hardening wireless access points and recognize how to harden network elements including firewalls, routers, and access points. This course was originally created by Global Knowledge (GK).
WHAT YOU WILL LEARN
-
discover the key concepts covered in this coursediscuss common calls received by help desk supportdiscuss considerations when limiting remote admin accessrecognize key decisions when granting administrative accessprovide an overview of using AAA for accessing network devicesrecognize key features of the Simple Network Management Protocol (SNMP)discuss types of firewalls and logical locations to place themlist the benefits of segmenting a networkrecognize how to control and manage traffic using rules on routers and firewallsdiscuss how firewall management relates to overall network hardeningrecognize how to disable discovery protocolsdiscuss measures to manage resources in a wiring closetdescribe measures to limit internal physical access to resourcesdiscuss the importance of keeping a telecoms closets secured
-
discuss wiring closet flaws and how to avoid themharden networks by controlling network device portsdescribe measures to limit external physical access to resourcesdescribe considerations when establishing secure accesslist physical security considerations when performing network hardeningrecognize how and where to filter traffic on a networkdiscuss the importance of hardening wireless access pointsuse a utility to perform Wi-Fi scanning on a networklist physical security concerns as they relate to wireless access pointsdiscuss hardening network elements including firewalls, routers, routers, and access pointssecure a network by changing default settings on all IT equipmentsummarize concepts and techniques used to provide device protection on a networkrecognize best practices as they relate to traffic filtering on a network
IN THIS COURSE
-
1.Introduction to Network Hardening49sUP NEXT
-
2.Help Desk Solutions1m 48s
-
3.Remote Access Considerations2m 38s
-
4.Administrative Access Considerations2m 18s
-
5.AAA Access for Network Devices1m 54s
-
6.Simple Network Management Protocol2m 5s
-
7.Firewall Strategies1m 15s
-
8.Network Segmentation2m 9s
-
9.Firewall Rules3m 16s
-
10.Firewall Management2m 18s
-
11.Discovery Protocols1m 22s
-
12.Wiring Closet Management59s
-
13.Internal Physical Access2m 41s
-
14.Telecom Closet Security1m 37s
-
15.Wiring Closet Flaws2m 19s
-
16.Network Device Port Security2m 17s
-
17.External Physical Access2m
-
18.Securing Connections2m 32s
-
19.Physical Security Considerations44s
-
20.Unwanted Traffic1m 12s
-
21.Wireless Access Points5m 17s
-
22.Wi-Fi Scanning Techniques3m 58s
-
23.Wireless Access Point Hardening1m 58s
-
24.Network Element Security3m 40s
-
25.Default Settings Considerations2m 21s
-
26.Protecting Network Devices1m 47s
-
27.Traffic Filtering Best Practices2m 52s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.