Security Best Practices: Network Appliance Security

IT Security
  • 14 Videos | 1h 38m 14s
  • Includes Assessment
  • Earns a Badge
Likes 9 Likes 9
This course explores the best practices for securing network appliances, and the top network security risks in 14 videos examining best practices for IoT (Internet of things) security risks. You will learn the best practices for transitioning to the Cloud, and the three basic service models IaaS (infrastructure as a service), PaaS (platform as a service), and SaaS (software as a service). Learners will then examine the network perimeter, and security issues and strategies when moving to the Cloud, including how to address de-perimeterization and perimeter exploitation. You will learn about several security architecture models, including Zero Trust Architecture, intrusion kill chain, and the diamond model for intrusion analysis. You will examine the impact of software defined networking, and micro-segmentation to the network security. Learn about next-generation firewalls, network intrusion detection and prevention systems, and distributed denial of service attacks. Finally, you will learn the best practices of Zero Trust Architecture, and how to incorporate them.

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    recognize the importance of securing network appliances and the top network security risks
    recognize best security practices for the Internet of Things
    describe the security risks and best practices for transitioning to the cloud
    recognize traditional infrastructure deficiencies, such as perimeter exploitation and de-perimeterization as a result of moving to the cloud
    recognize concerns of moving to the security first mindset and de-perimeterization problems
    describe Collaboration-oriented Architecture and how it can be used to deal with de-perimeterization
  • recognize various security architecture models such as the Zero Trust Model, the intrusion kill chain, and the diamond model of intrusion analysis
    recognize the impact of software defined networking, virtual networking, and micro-segmentation to network security
    recognize the best security places for network devices such as Next Generation Firewalls, Network Intrusion Detection and Prevention Systems, and Distributed Denial of Service Attacks
    describe the Zero Trust Architecture and how to apply to the Zero Trust Model
    recognize Zero Trust challenges, problems, and concerns
    recognize and employ best practices for using the Zero Trust Architecture
    summarize the key concepts covered in this course

IN THIS COURSE

  • Playable
    1. 
    Course Overview
    1m 52s
    UP NEXT
  • Playable
    2. 
    IoT Security Risks
    12m 9s
  • Locked
    3. 
    IoT Security Best Practices
    6m 34s
  • Locked
    4. 
    Transitioning to the Cloud
    10m 59s
  • Locked
    5. 
    Cloud Perimeter Security Strategies
    8m 21s
  • Locked
    6. 
    Infrastructure De-perimeterization
    10m 1s
  • Locked
    7. 
    Collaboration-oriented Architecture
    5m 40s
  • Locked
    8. 
    Security Architecture Models
    8m 38s
  • Locked
    9. 
    Network Architectures
    5m 4s
  • Locked
    10. 
    Network Devices Best Security Practices
    6m 53s
  • Locked
    11. 
    Zero Trust Architecture
    5m 43s
  • Locked
    12. 
    Zero Trust Concerns
    5m 47s
  • Locked
    13. 
    Zero Trust Architecture Best Practices
    3m 44s
  • Locked
    14. 
    Course Summary
    49s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Likes 173 Likes 173  
Likes 176 Likes 176