Security Topologies: Developing Secure Networks
IT Security
| Intermediate
- 14 Videos | 1h 1m 25s
- Includes Assessment
- Earns a Badge
Learners can explore secure network challenges and security measures used to configure common tools, in this 14-video course. Familiarize yourself with approaches to configuration with a security mindset and review common security threats and their mitigations. Begin by taking a look at the challenges of a secure-first network design, then describe a network design approach from a security mindset. Examine the challenges to DevOps and Agile mindsets in terms of security decisions, and the network security concerns for hybrid cloud models. Learn how to configure an NGINX HTTP service to prevent insecure file access and configure web application security settings in NGINX. View the dangers of file upload remote execution; use Secure Shell (SSH) as a secure proxy for web browsing from an insecure location, and configure a SSH client to use present server connection settings. Discover how to use local/etc/hosts to block unwanted connections; examine the threat of user account discovery and how it is carried out, and finally, learn how to use password security tools to enforce a strong password policy.
WHAT YOU WILL LEARN
-
discover the key concepts covered in this coursedescribe the challenges of a secure-first network designdescribe a network design approach from a security mindsetdescribe the challenges to DevOps and Agile mindsets in terms of security decisionsdescribe the network security concerns for hybrid cloud modelsconfigure an NGINX HTTP service to prevent insecure file accessconfigure web application security settings in NGINX
-
describe the dangers of file upload remote executionuse SSH as a secure proxy for web browsing from an insecure locationconfigure an SSH client to use preset server connection settingsuse the local /etc/hosts to block unwanted connectionsdescribe the threat of user account discovery and how it is carried outuse password security tools to enforce a strong password policysummarize the key concepts covered in this course
IN THIS COURSE
-
1.Course Overview1m 34sUP NEXT
-
2.Secure Network Challenges4m 33s
-
3.Secure Solutions2m 57s
-
4.DevOps Security Challenges2m 56s
-
5.Hybrid Cloud Security3m 27s
-
6.Preventing Insecure HTTP7m 40s
-
7.Web Application Security8m 30s
-
8.File Upload Execution4m 34s
-
9.SSH Client Proxy5m 21s
-
10.SSH Config5m 51s
-
11.Local Hosts Blocking4m 40s
-
12.User Account Discovery4m 58s
-
13.Linux Password Security3m 14s
-
14.Course Summary1m 11s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.