CompTIA Linux+: Firewalls & Monitoring

CompTIA    |    Intermediate
  • 13 videos | 1h 20m
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 7 users Rating 4.6 of 7 users (7)
There are various Linux firewall options to control inbound and outbound traffic for Linux hosts. Proxy servers, intrusion detection system (IDS) and intrusion prevention system (IPS) solutions, and security information and event management (SIEM) monitoring solutions all play a part in securing the Linux ecosystem. In this course, you will explore IP forwarding and various types of firewalls, including those available in the Linux OS. Then you will learn how to configure firewall settings using iptables and Uncomplicated Firewall (UFW) and you will discover when and how to use forward and reverse proxy servers. Next, you will investigate IDS/IPS, configure the Snort IDS, and find out how honeypots and honeynets can be used to monitor malicious activity. Finally, you will examine how SIEM and security orchestration, automation, and response (SOAR) solutions can be used to detect and remediate security incidents. This course can be used to prepare for the Linux+ XK0-005 certification exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Recognize the different types of firewalls, including the web application firewall (waf), their placement, such as in the demilitarized zone (dmz), and when they should be used
    Recall various linux firewall solutions including firewalld, iptables, nftables, and uncomplicated firewall (ufw)
    Configure iptables linux network firewall settings
    Configure ufw in linux
    Outline the role played by forward and reverse proxy servers
    Install the squid proxy server on linux
  • Describe how intrusion detection system (ids) and intrusion prevention system (ips) solutions address security issues
    Install and configure the snort ids tool
    Recognize where honeypots and honeynets can be used to monitor malicious traffic
    Outline how a siem solution serves as a central ingestion point for security analysis
    Describe how a soar solution serves as a method of automating security incident remediation
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 19s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 9m 15s
    After completing this video, you will be able to recognize the different types of firewalls, including the web application firewall (WAF), their placement, such as in the demilitarized zone (DMZ), and when they should be used. FREE ACCESS
  • Locked
    3.  Linux Firewall Solutions and IP Forwarding
    5m 43s
    Upon completion of this video, you will be able to recall various Linux firewall solutions including firewalld, iptables, nftables, and Uncomplicated Firewall (UFW). FREE ACCESS
  • Locked
    4.  Configuring a Linux Firewall With iptables
    5m 41s
    Find out how to configure iptables Linux network firewall settings. FREE ACCESS
  • Locked
    5.  Configuring a Linux Firewall With UFW
    5m 58s
    In this video, you will learn how to configure UFW in Linux. FREE ACCESS
  • Locked
    6.  Proxy Servers
    7m 24s
    After completing this video, you will be able to outline the role played by forward and reverse proxy servers. FREE ACCESS
  • Locked
    7.  Deploying the Squid Proxy Server
    7m 29s
    During this video, discover how to install the Squid proxy server on Linux. FREE ACCESS
  • Locked
    8.  Intrusion Detection and Prevention
    8m 16s
    Upon completion of this video, you will be able to describe how intrusion detection system (IDS) and intrusion prevention system (IPS) solutions address security issues. FREE ACCESS
  • Locked
    9.  Configuring the Snort IDS
    8m 54s
    Learn how to install and configure the Snort IDS tool. FREE ACCESS
  • Locked
    10.  Honeypots and Honeynets
    5m 36s
    After completing this video, you will be able to recognize where honeypots and honeynets can be used to monitor malicious traffic. FREE ACCESS
  • Locked
    11.  Security Information and Event Management (SIEM)
    5m 56s
    Upon completion of this video, you will be able to outline how a SIEM solution serves as a central ingestion point for security analysis. FREE ACCESS
  • Locked
    12.  Security Orchestration, Automation, and Response (SOAR)
    7m 34s
    After completing this video, you will be able to describe how a SOAR solution serves as a method of automating security incident remediation. FREE ACCESS
  • Locked
    13.  Course Summary
    55s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 2 users Rating 5.0 of 2 users (2)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 4.6 of 21 users Rating 4.6 of 21 users (21)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.8 of 10 users Rating 4.8 of 10 users (10)
Rating 4.5 of 215 users Rating 4.5 of 215 users (215)
Rating 4.7 of 7 users Rating 4.7 of 7 users (7)