CISA 2022: Securing Networks & IT Assets

CISA    |    Expert
  • 13 videos | 1h 44m 57s
  • Includes Assessment
  • Earns a Badge
Rating 5.0 of 4 users Rating 5.0 of 4 users (4)
In any enterprise information technology environment, network and IT assets must be secured in order to preserve the integrity and legal standing of the organization. In this course, you will discover key aspects of securing networks and IT assets, beginning with network attacks, network threat mitigation, firewalls, and security monitoring and testing. Then you will explore the identification of plaintext network traffic, implementation of a packet filtering firewall, and implementation of a content filtering firewall. Finally, you will learn about physical asset protection, focusing on heating, ventilation, and air conditioning (HVAC) systems, physical security, drones and proximity security, and fire suppression systems. This course helps prepare learners for the ISACA certification exam, Certified Information Systems Auditor (CISA).

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Describe common network attacks such as man-in-the-middle, address resolution protocol (arp) and domain name system (dns) poisoning, and distributed denial-of-service (ddos) attacks
    Describe how 802.1x, virtual local area networks (vlans), media access control (mac) filtering, and other network configuration options can enhance network security
    Identify the different types of firewalls, including web application firewalls (wafs), their placement, and when they should be used
    Provide an overview of security monitoring and testing tools and techniques
    Utilize the free wireshark tool to capture and analyze plaintext network traffic
    Configure windows advanced firewall
  • Configure url content and keyword filtering on a wireless router
    Outline potential business process risks related to heating, ventilation, and air conditioning (hvac)
    Describe methods of securing assets using physical controls
    Describe how drones can present eavesdropping and other risks
    Identify different types of fire suppression systems
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 18s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 9m 41s
    After completing this video, you will be able to describe common network attacks such as man-in-the-middle, Address Resolution Protocol (ARP) and domain name system (DNS) poisoning, and distributed denial-of-service (DDoS) attacks. FREE ACCESS
  • Locked
    3.  Network Threat Mitigation
    11m 44s
    Upon completion of this video, you will be able to describe how 802.1X, virtual local area networks (VLANs), media access control (MAC) filtering, and other network configuration options can enhance network security. FREE ACCESS
  • Locked
    4.  Firewalls
    11m 27s
    After completing this video, you will be able to identify the different types of firewalls, including web application firewalls (WAFs), their placement, and when they should be used. FREE ACCESS
  • Locked
    5.  Security Monitoring and Testing
    9m 25s
    Upon completion of this video, you will be able to provide an overview of security monitoring and testing tools and techniques. FREE ACCESS
  • Locked
    6.  Identifying Plaintext Network Traffic
    15m 7s
    Find out how to utilize the free Wireshark tool to capture and analyze plaintext network traffic. FREE ACCESS
  • Locked
    7.  Implementing a Packet Filtering Firewall
    13m 20s
    In this video, discover how to configure Windows Advanced Firewall. FREE ACCESS
  • Locked
    8.  Implementing a Content Filtering Firewall
    6m 10s
    During this video, you will learn how to configure URL content and keyword filtering on a wireless router. FREE ACCESS
  • Locked
    9.  HVAC
    5m 3s
    After completing this video, you will be able to outline potential business process risks related to heating, ventilation, and air conditioning (HVAC). FREE ACCESS
  • Locked
    10.  Physical Security
    9m 31s
    Upon completion of this video, you will be able to describe methods of securing assets using physical controls. FREE ACCESS
  • Locked
    11.  Drones and Proximity Security
    5m 38s
    After completing this video, you will be able to describe how drones can present eavesdropping and other risks. FREE ACCESS
  • Locked
    12.  Fire Suppression Systems
    5m 26s
    Upon completion of this video, you will be able to identify different types of fire suppression systems. FREE ACCESS
  • Locked
    13.  Course Summary
    1m 6s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 5 users Rating 4.6 of 5 users (5)
Rating 4.8 of 44 users Rating 4.8 of 44 users (44)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 5.0 of 8 users Rating 5.0 of 8 users (8)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 4.5 of 714 users Rating 4.5 of 714 users (714)