CISM 2022: Network Security
CISM
| Intermediate
- 11 videos | 1h 10m 36s
- Includes Assessment
- Earns a Badge
Organizations should secure resource access while remaining compliant with relevant laws and regulations. One of the many ways to do this is to ensure proper network security controls are in place and reviewed regularly. In this course, examine the OSI model layers and their relevance to network security controls, as well as the security aspects of network switching and network access control. Next, explore DHCP and DNS security issues and Wi-Fi authentication methods, and discover how to harden a DHCP and DNS deployment on Windows Server. Finally, learn the importance of using honeypots and honeynets, and how to implement a honeypot and analyze captured network traffic. This course can be used to prepare for the Certified Information Security Manager (CISM) exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseList the main characteristics of each osi layerOutline how network switching works, including the use of vlansCreate a vmware workstation disconnected virtual network switchState the security aspects of dhcp and dns usageHarden dhcp and dns services
-
List various ways to authenticate to a wi-fi networkRecognize where honeypots and honeynets can be used to monitor malicious trafficImplement and configure a honeypotOpen and analyze a packet capture using wiresharkSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 25sIn this video, we will discover the key concepts covered in this course. FREE ACCESS
-
11m 31sUpon completion of this video, you will be able to list the main characteristics of each OSI layer. FREE ACCESS
-
7m 8sAfter completing this video, you will be able to outline how network switching works, including the use of VLANs. FREE ACCESS
-
6m 40sDiscover how to create a VMware Workstation disconnected virtual network switch. FREE ACCESS
-
10m 33sIn this video, we will state the security aspects of DHCP and DNS usage. FREE ACCESS
-
7m 25sLearn how to harden DHCP and DNS services. FREE ACCESS
-
7m 45sAfter completing this video, you will be able to list various ways to authenticate to a Wi-Fi network. FREE ACCESS
-
6m 14sIn this video, you will recognize where honeypots and honeynets can be used to monitor malicious traffic. FREE ACCESS
-
5m 5sIn this video, find out how to implement and configure a honeypot. FREE ACCESS
-
5m 47sDuring this video, discover how to open and analyze a packet capture using Wireshark. FREE ACCESS
-
1m 2sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.