CISA 2022: Securing Networks & IT Assets
CISA
| Expert
- 13 videos | 1h 44m 57s
- Includes Assessment
- Earns a Badge
In any enterprise information technology environment, network and IT assets must be secured in order to preserve the integrity and legal standing of the organization. In this course, you will discover key aspects of securing networks and IT assets, beginning with network attacks, network threat mitigation, firewalls, and security monitoring and testing. Then you will explore the identification of plaintext network traffic, implementation of a packet filtering firewall, and implementation of a content filtering firewall. Finally, you will learn about physical asset protection, focusing on heating, ventilation, and air conditioning (HVAC) systems, physical security, drones and proximity security, and fire suppression systems. This course helps prepare learners for the ISACA certification exam, Certified Information Systems Auditor (CISA).
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDescribe common network attacks such as man-in-the-middle, address resolution protocol (arp) and domain name system (dns) poisoning, and distributed denial-of-service (ddos) attacksDescribe how 802.1x, virtual local area networks (vlans), media access control (mac) filtering, and other network configuration options can enhance network securityIdentify the different types of firewalls, including web application firewalls (wafs), their placement, and when they should be usedProvide an overview of security monitoring and testing tools and techniquesUtilize the free wireshark tool to capture and analyze plaintext network trafficConfigure windows advanced firewall
-
Configure url content and keyword filtering on a wireless routerOutline potential business process risks related to heating, ventilation, and air conditioning (hvac)Describe methods of securing assets using physical controlsDescribe how drones can present eavesdropping and other risksIdentify different types of fire suppression systemsSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 18sIn this video, we will discover the key concepts covered in this course. FREE ACCESS
-
9m 41sAfter completing this video, you will be able to describe common network attacks such as man-in-the-middle, Address Resolution Protocol (ARP) and domain name system (DNS) poisoning, and distributed denial-of-service (DDoS) attacks. FREE ACCESS
-
11m 44sUpon completion of this video, you will be able to describe how 802.1X, virtual local area networks (VLANs), media access control (MAC) filtering, and other network configuration options can enhance network security. FREE ACCESS
-
11m 27sAfter completing this video, you will be able to identify the different types of firewalls, including web application firewalls (WAFs), their placement, and when they should be used. FREE ACCESS
-
9m 25sUpon completion of this video, you will be able to provide an overview of security monitoring and testing tools and techniques. FREE ACCESS
-
15m 7sFind out how to utilize the free Wireshark tool to capture and analyze plaintext network traffic. FREE ACCESS
-
13m 20sIn this video, discover how to configure Windows Advanced Firewall. FREE ACCESS
-
6m 10sDuring this video, you will learn how to configure URL content and keyword filtering on a wireless router. FREE ACCESS
-
5m 3sAfter completing this video, you will be able to outline potential business process risks related to heating, ventilation, and air conditioning (HVAC). FREE ACCESS
-
9m 31sUpon completion of this video, you will be able to describe methods of securing assets using physical controls. FREE ACCESS
-
5m 38sAfter completing this video, you will be able to describe how drones can present eavesdropping and other risks. FREE ACCESS
-
5m 26sUpon completion of this video, you will be able to identify different types of fire suppression systems. FREE ACCESS
-
1m 6sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.