CompTIA Linux+: Firewalls & Monitoring
CompTIA
| Intermediate
- 13 videos | 1h 20m
- Includes Assessment
- Earns a Badge
There are various Linux firewall options to control inbound and outbound traffic for Linux hosts. Proxy servers, intrusion detection system (IDS) and intrusion prevention system (IPS) solutions, and security information and event management (SIEM) monitoring solutions all play a part in securing the Linux ecosystem. In this course, you will explore IP forwarding and various types of firewalls, including those available in the Linux OS. Then you will learn how to configure firewall settings using iptables and Uncomplicated Firewall (UFW) and you will discover when and how to use forward and reverse proxy servers. Next, you will investigate IDS/IPS, configure the Snort IDS, and find out how honeypots and honeynets can be used to monitor malicious activity. Finally, you will examine how SIEM and security orchestration, automation, and response (SOAR) solutions can be used to detect and remediate security incidents. This course can be used to prepare for the Linux+ XK0-005 certification exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseRecognize the different types of firewalls, including the web application firewall (waf), their placement, such as in the demilitarized zone (dmz), and when they should be usedRecall various linux firewall solutions including firewalld, iptables, nftables, and uncomplicated firewall (ufw)Configure iptables linux network firewall settingsConfigure ufw in linuxOutline the role played by forward and reverse proxy serversInstall the squid proxy server on linux
-
Describe how intrusion detection system (ids) and intrusion prevention system (ips) solutions address security issuesInstall and configure the snort ids toolRecognize where honeypots and honeynets can be used to monitor malicious trafficOutline how a siem solution serves as a central ingestion point for security analysisDescribe how a soar solution serves as a method of automating security incident remediationSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 19sIn this video, we will discover the key concepts covered in this course. FREE ACCESS
-
9m 15sAfter completing this video, you will be able to recognize the different types of firewalls, including the web application firewall (WAF), their placement, such as in the demilitarized zone (DMZ), and when they should be used. FREE ACCESS
-
5m 43sUpon completion of this video, you will be able to recall various Linux firewall solutions including firewalld, iptables, nftables, and Uncomplicated Firewall (UFW). FREE ACCESS
-
5m 41sFind out how to configure iptables Linux network firewall settings. FREE ACCESS
-
5m 58sIn this video, you will learn how to configure UFW in Linux. FREE ACCESS
-
7m 24sAfter completing this video, you will be able to outline the role played by forward and reverse proxy servers. FREE ACCESS
-
7m 29sDuring this video, discover how to install the Squid proxy server on Linux. FREE ACCESS
-
8m 16sUpon completion of this video, you will be able to describe how intrusion detection system (IDS) and intrusion prevention system (IPS) solutions address security issues. FREE ACCESS
-
8m 54sLearn how to install and configure the Snort IDS tool. FREE ACCESS
-
5m 36sAfter completing this video, you will be able to recognize where honeypots and honeynets can be used to monitor malicious traffic. FREE ACCESS
-
5m 56sUpon completion of this video, you will be able to outline how a SIEM solution serves as a central ingestion point for security analysis. FREE ACCESS
-
7m 34sAfter completing this video, you will be able to describe how a SOAR solution serves as a method of automating security incident remediation. FREE ACCESS
-
55sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.