CompTIA Cybersecurity Analyst+: Network Security Concepts

Cybersecurity    |    Intermediate
  • 14 videos | 1h 29m 33s
  • Includes Assessment
  • Earns a Badge
Rating 4.4 of 5 users Rating 4.4 of 5 users (5)
Cybersecurity policies often require detailed network configuration changes and additions. Technicians must be proficient with the configuration and management of various TCP/IP protocols. In this course, I will start by discussing the Open Systems Interconnection (OSI) model, network switching, and network access control. Next, I'll discuss the TCP/IP protocol suite as well as IPv4 and IPv6 addressing. I will then discuss network routing, dynamic host configuration protocol (DHCP), domain name system (DNS) and Wi-Fi authentication methods. Lastly, I will cover virtual private networks (VPNs), IP Security (IPsec) and network time synchronization. This course can be used to prepare for the CS0-003: CompTIA Cybersecurity Analyst+ (CySA+) exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Identify how network hardware and software maps to the open systems interconnection (osi) model
    Outline how network switching works, including the use of virtual local area network (vlans)
    Recognize the most common tcp/ip protocols
    Outline how to plan for ipv4 and ipv6 addressing
    Identify network routing concepts and protocols such as rip, bgp and ospf
    Outline the security aspect of dynamic host configuration protocol (dhcp) usage
  • Outline the security aspect of domain name system (dns) usage
    List various ways of authenticating to a wi-fi network
    Recognize how virtual private networks (vpns) provide encrypted tunnels to remote networks
    Outline how the ipsec network security protocol suite protects network traffic
    Outline how network time synchronization works
    Configure network time synchronization in linux
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 15s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 9m 11s
    After completing this video, you will be able to identify how network hardware and software maps to the Open Systems Interconnection (OSI) model. FREE ACCESS
  • Locked
    3.  Network Switching and Network Access Control
    7m 32s
    Upon completion of this video, you will be able to outline how network switching works, including the use of virtual local area network (VLANs). FREE ACCESS
  • Locked
    4.  The TCP/IP Protocol Suite
    7m 4s
    After completing this video, you will be able to recognize the most common TCP/IP protocols. FREE ACCESS
  • Locked
    5.  IP Addressing
    7m 12s
    Upon completion of this video, you will be able to outline how to plan for IPv4 and IPv6 addressing. FREE ACCESS
  • Locked
    6.  Network Routing
    8m 7s
    After completing this video, you will be able to identify network routing concepts and protocols such as RIP, BGP and OSPF. FREE ACCESS
  • Locked
    7.  Dynamic Host Configuration Protocol (DHCP) Security
    8m 8s
    Upon completion of this video, you will be able to outline the security aspect of dynamic host configuration protocol (DHCP) usage. FREE ACCESS
  • Locked
    8.  Domain Name System (DNS) Security
    6m 8s
    After completing this video, you will be able to outline the security aspect of domain name system (DNS) usage. FREE ACCESS
  • Locked
    9.  Wi-Fi Authentication Methods
    7m 17s
    Upon completion of this video, you will be able to list various ways of authenticating to a Wi-Fi network. FREE ACCESS
  • Locked
    10.  Virtual Private Networks (VPNs)
    7m 42s
    After completing this video, you will be able to recognize how virtual private networks (VPNs) provide encrypted tunnels to remote networks. FREE ACCESS
  • Locked
    11.  IP Security (IPsec)
    7m 19s
    Upon completion of this video, you will be able to outline how the IPsec network security protocol suite protects network traffic. FREE ACCESS
  • Locked
    12.  Network Time Protocol
    5m 13s
    After completing this video, you will be able to outline how network time synchronization works. FREE ACCESS
  • Locked
    13.  Configuring Network Time Synchronization in Linux
    6m 28s
    Learn how to configure network time synchronization in Linux. FREE ACCESS
  • Locked
    14.  Course Summary
    58s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 30 users Rating 4.6 of 30 users (30)
Rating 4.5 of 24 users Rating 4.5 of 24 users (24)
Rating 4.6 of 123 users Rating 4.6 of 123 users (123)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 1341 users Rating 4.5 of 1341 users (1341)
Rating 4.5 of 483 users Rating 4.5 of 483 users (483)
Rating 5.0 of 4 users Rating 5.0 of 4 users (4)