Security Topologies: Developing Secure Networks

IT Security    |    Intermediate
  • 14 videos | 1h 1m 25s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 32 users Rating 4.6 of 32 users (32)
Learners can explore secure network challenges and security measures used to configure common tools, in this 14-video course. Familiarize yourself with approaches to configuration with a security mindset and review common security threats and their mitigations. Begin by taking a look at the challenges of a secure-first network design, then describe a network design approach from a security mindset. Examine the challenges to DevOps and Agile mindsets in terms of security decisions, and the network security concerns for hybrid cloud models. Learn how to configure an NGINX HTTP service to prevent insecure file access and configure web application security settings in NGINX. View the dangers of file upload remote execution; use Secure Shell (SSH) as a secure proxy for web browsing from an insecure location, and configure a SSH client to use present server connection settings. Discover how to use local/etc/hosts to block unwanted connections; examine the threat of user account discovery and how it is carried out, and finally, learn how to use password security tools to enforce a strong password policy.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Describe the challenges of a secure-first network design
    Describe a network design approach from a security mindset
    Describe the challenges to devops and agile mindsets in terms of security decisions
    Describe the network security concerns for hybrid cloud models
    Configure an nginx http service to prevent insecure file access
    Configure web application security settings in nginx
  • Describe the dangers of file upload remote execution
    Use ssh as a secure proxy for web browsing from an insecure location
    Configure an ssh client to use preset server connection settings
    Use the local /etc/hosts to block unwanted connections
    Describe the threat of user account discovery and how it is carried out
    Use password security tools to enforce a strong password policy
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 34s
  • 4m 33s
    After completing this video, you will be able to describe the challenges of a network design that focuses on security. FREE ACCESS
  • Locked
    3.  Secure Solutions
    2m 57s
    Upon completion of this video, you will be able to describe a network design approach from a security perspective. FREE ACCESS
  • Locked
    4.  DevOps Security Challenges
    2m 56s
    After completing this video, you will be able to describe the challenges to security decisions in terms of DevOps and Agile mindsets. FREE ACCESS
  • Locked
    5.  Hybrid Cloud Security
    3m 27s
    Upon completion of this video, you will be able to describe the network security concerns for hybrid cloud models. FREE ACCESS
  • Locked
    6.  Preventing Insecure HTTP
    7m 40s
    During this video, you will learn how to configure an NGINX HTTP service to prevent access to files that are not secure. FREE ACCESS
  • Locked
    7.  Web Application Security
    8m 30s
    In this video, you will learn how to configure web application security settings in NGINX. FREE ACCESS
  • Locked
    8.  File Upload Execution
    4m 34s
    After completing this video, you will be able to describe the dangers of remote file execution. FREE ACCESS
  • Locked
    9.  SSH Client Proxy
    5m 21s
    Find out how to use SSH as a secure proxy for web browsing from an insecure location. FREE ACCESS
  • Locked
    10.  SSH Config
    5m 51s
    In this video, find out how to configure an SSH client to use preset server connection settings. FREE ACCESS
  • Locked
    11.  Local Hosts Blocking
    4m 40s
    In this video, you will use the local /etc/hosts file to block unwanted connections. FREE ACCESS
  • Locked
    12.  User Account Discovery
    4m 58s
    Upon completion of this video, you will be able to describe the threat of user account discovery and how to carry it out. FREE ACCESS
  • Locked
    13.  Linux Password Security
    3m 14s
    In this video, you will use password security tools to enforce a strong password policy. FREE ACCESS
  • Locked
    14.  Course Summary
    1m 11s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.7 of 90 users Rating 4.7 of 90 users (90)
Rating 4.6 of 22 users Rating 4.6 of 22 users (22)
Rating 4.7 of 266 users Rating 4.7 of 266 users (266)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 181 users Rating 4.6 of 181 users (181)
Rating 5.0 of 4 users Rating 5.0 of 4 users (4)
Rating 4.3 of 333 users Rating 4.3 of 333 users (333)