Network Infrastructure Security

CISA 2016    |    Expert
  • 12 videos | 53m 52s
  • Includes Assessment
  • Earns a Badge
Rating 4.5 of 8 users Rating 4.5 of 8 users (8)
IS auditing demands that an organization's policies and procedures protect the confidentiality, integrity, and availability of information assets. Explore network infrastructure security, including LAN, client-server, and wireless security.

WHAT YOU WILL LEARN

  • Identify characteristics of lan security including virtualization
    Identify characteristics of client-server security
    Identify best practices for wireless security
    Distinguish between common internet threats
    Distinguish between different firewall technologies
    Compare ids and ips
  • Identify cryptography and cryptanalysis
    Identify common cryptosystems
    Identify common cryptosystems
    Identify characteristics of malware and best practices for mitigating risk from them
    Identify characteristics and security issues of voip
    Recognize characteristics of pbx

IN THIS COURSE

  • 5m 16s
    In this video, find out how to identify characteristics of LAN security, including virtualization. FREE ACCESS
  • 1m 59s
    In this video, you will identify characteristics of client-server security. FREE ACCESS
  • Locked
    3.  Wireless Security Threats and Mitigation
    4m 1s
    Find out how to identify best practices for wireless security. FREE ACCESS
  • Locked
    4.  Internet Threats and Security
    7m 11s
    Find out how to distinguish between common internet threats. FREE ACCESS
  • Locked
    5.  Firewall Technologies
    5m 15s
    During this video, you will learn how to distinguish between different firewall technologies. FREE ACCESS
  • Locked
    6.  Intrusion Detection and Intrusion Prevention
    5m 51s
    In this video, learn how to compare IDS and IPS. FREE ACCESS
  • Locked
    7.  Encryption
    2m 53s
    In this video, you will learn how to identify cryptography and cryptanalysis. FREE ACCESS
  • Locked
    8.  Types of Cryptosystems (part 1)
    8m 31s
    In this video, you will identify common cryptographic systems. FREE ACCESS
  • Locked
    9.  Types of Cryptosystems (part 2)
    4m 31s
    In this video, you will learn how to identify common cryptosystems. FREE ACCESS
  • Locked
    10.  Malware
    2m 53s
    In this video, you will learn how to identify characteristics of malware and best practices for mitigating risk from them. FREE ACCESS
  • Locked
    11.  Voice-over IP
    2m 25s
    In this video, find out how to identify characteristics and security issues of Voice over Internet Protocol (VoIP). FREE ACCESS
  • Locked
    12.  private Branch Exchange
    3m 7s
    After completing this video, you will be able to recognize characteristics of a PBX. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.7 of 266 users Rating 4.7 of 266 users (266)
Rating 4.6 of 22 users Rating 4.6 of 22 users (22)
Rating 4.4 of 17 users Rating 4.4 of 17 users (17)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 120 users Rating 4.6 of 120 users (120)
Rating 4.7 of 90 users Rating 4.7 of 90 users (90)
Rating 4.4 of 13 users Rating 4.4 of 13 users (13)