Security Topologies: Developing Secure Networks

IT Security    |    Intermediate
  • 14 Videos | 1h 7m 25s
  • Includes Assessment
  • Earns a Badge
Likes 26 Likes 26
Learners can explore secure network challenges and security measures used to configure common tools, in this 14-video course. Familiarize yourself with approaches to configuration with a security mindset and review common security threats and their mitigations. Begin by taking a look at the challenges of a secure-first network design, then describe a network design approach from a security mindset. Examine the challenges to DevOps and Agile mindsets in terms of security decisions, and the network security concerns for hybrid cloud models. Learn how to configure an NGINX HTTP service to prevent insecure file access and configure web application security settings in NGINX. View the dangers of file upload remote execution; use Secure Shell (SSH) as a secure proxy for web browsing from an insecure location, and configure a SSH client to use present server connection settings. Discover how to use local/etc/hosts to block unwanted connections; examine the threat of user account discovery and how it is carried out, and finally, learn how to use password security tools to enforce a strong password policy.

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    describe the challenges of a secure-first network design
    describe a network design approach from a security mindset
    describe the challenges to DevOps and Agile mindsets in terms of security decisions
    describe the network security concerns for hybrid cloud models
    configure an NGINX HTTP service to prevent insecure file access
    configure web application security settings in NGINX
  • describe the dangers of file upload remote execution
    use SSH as a secure proxy for web browsing from an insecure location
    configure an SSH client to use preset server connection settings
    use the local /etc/hosts to block unwanted connections
    describe the threat of user account discovery and how it is carried out
    use password security tools to enforce a strong password policy
    summarize the key concepts covered in this course

IN THIS COURSE

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Likes 15 Likes 15  
Likes 6 Likes 6  

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

COURSE SOLID & GRASP
Likes 3218 Likes 3218  
Likes 41 Likes 41