CISM 2022: Network Attack Mitigation

CISM    |    Intermediate
  • 10 videos | 1h 2m 17s
  • Includes Assessment
  • Earns a Badge
Rating 4.9 of 10 users Rating 4.9 of 10 users (10)
To effectively defend against common network attacks, organizations must truly understand how they are executed. Thereafter, information security managers can implement and manage security controls to address network security control objectives. In this course, explore firewall types, configure the built-in Windows Defender Firewall, and adjust firewall rules on a Linux host. Next, learn how to manage Azure cloud network security groups to control virtual network subnet and interface traffic and how forward and reverse proxy servers can enable inbound and outbound network security. Finally, examine the relevance of intrusion detection placement and prevention configurations and configure the open-source Snort IDS tool to detect suspicious traffic. This course can be used to prepare for the Certified Information Security Manager (CISM) exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Recognize the different types of firewalls, their placement, and when they should be used
    Configure windows defender firewall settings
    Configure linux network firewall settings
    Configure firewall rules in an azure nsg
  • Configure various types of firewall settings in azure firewall
    Identify the role played by forward and reverse proxy servers
    Outline how ids and ips solutions address security issues
    Install and configure the snort ids tool
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 17s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 7m 50s
    After completing this video, you will be able to recognize the different types of firewalls, their placement, and when they should be used. FREE ACCESS
  • Locked
    3.  Configuring Windows Defender Firewall
    7m 31s
    During this video, you will learn how to configure Windows Defender Firewall settings. FREE ACCESS
  • Locked
    4.  Adjusting a Linux Firewall
    5m 53s
    Discover how to configure Linux network firewall settings. FREE ACCESS
  • Locked
    5.  Manage Azure Network Security Groups (NSGs)
    5m 51s
    In this video, find out how to configure firewall rules in an Azure NSG. FREE ACCESS
  • Locked
    6.  Administering Microsoft Azure Firewall
    6m 50s
    Learn how to configure various types of firewall settings in Azure Firewall. FREE ACCESS
  • Locked
    7.  Proxy Servers
    9m 8s
    In this video, you will identify the role played by forward and reverse proxy servers. FREE ACCESS
  • Locked
    8.  Intrusion Detection and Prevention
    8m 54s
    Upon completion of this video, you will be able to outline how IDS and IPS solutions address security issues. FREE ACCESS
  • Locked
    9.  Configuring the Snort IDS Tool
    8m 16s
    During this video, discover how to install and configure the Snort IDS tool. FREE ACCESS
  • Locked
    10.  Course Summary
    49s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.8 of 44 users Rating 4.8 of 44 users (44)
Rating 4.6 of 14 users Rating 4.6 of 14 users (14)
Rating 4.7 of 7 users Rating 4.7 of 7 users (7)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.8 of 17 users Rating 4.8 of 17 users (17)
Rating 4.7 of 12 users Rating 4.7 of 12 users (12)
Rating 4.7 of 52 users Rating 4.7 of 52 users (52)