Security Architecture
Cybersecurity
| Beginner
- 19 Videos | 1h 11m 56s
- Includes Assessment
- Earns a Badge
Security architecture can be defined as the specifications, processes, and standard operating procedures (SOPs) required to protect an organization's IT infrastructure. In order to improve network security and mitigate risks, a series of network devices can be used to control access to networks and resources. In this course, explore how security architectures can be used to enforce security at the network layer. Explore basic switching and routing devices, and discover core functions of a network intrusion detection systems (NIDS) and host-based intrusion detection systems (HIDS). Explore the characteristics and categories of firewall devices, and learn about networks, intranets, and demilitarized zones. Discover the benefits of network segmentation and learn how to segment networks. Lastly, discover how Network Address Translation (NAT) is used to map addresses, and explore how Network Access Control (NAC) can be used to verify compliance using security policies. This course was originally created by Global Knowledge (GK).
WHAT YOU WILL LEARN
-
discover the key concepts covered in this coursedefine security architectures and recognize how they enforce security at the network layerdescribe how network devices can be used to control access to a network and its resourcesprovide an overview of routers and basic routing functionsrecognize how and when to use network switchesdifferentiate between switches and routerslist core functions of an network intrusion detection system (NIDS)recognize the purpose of host-based intrusion detection systems (HIDS)list characteristics of network firewallsdiscuss how firewalls and firewall rules work
-
differentiate between network zones including internal, internet, and perimeter zoneslist resources commonly installed and configured on an intranetprovide an overview of demilitarized zones (DMZ)list common devices found in a DMZ including web servers, FTP servers, email relays, DNS servers, and reverse proxy serversdiscuss the benefits of dividing a large network into smaller logical groupsrecognize how to segment networkslist common segmentation concepts used to divide a networkdescribe how Network Address Translation (NAT) is used to map addressesdescribe how Network Access Control (NAC) can be used to verify compliance using security policies
IN THIS COURSE
-
1.Introduction to Security Architecture31sUP NEXT
-
2.Security Architecture1m 16s
-
3.Network Device Considerations6m 4s
-
4.Network Router Fundamentals4m
-
5.Network Switch Fundamentals9m 4s
-
6.Comparing Switches and Routers4m 10s
-
7.Network Intrusion Detection Systems5m 43s
-
8.Host-based Intrusion Detection Systems3m 30s
-
9.Firewall Characteristics1m 44s
-
10.Firewall Categories2m 48s
-
11.Network Zones1m
-
12.Intranet Zones2m 54s
-
13.Demilitarized Zones4m 1s
-
14.Common DMZ Devices1m 18s
-
15.Network Segmentation3m 34s
-
16.Methods for Segmenting Networks4m 49s
-
17.Types of network segmentation4m 10s
-
18.Network Address Translation9m 34s
-
19.Network Access Control1m 47s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.