CompTIA Network+: Network Security Concepts & Solutions

CompTIA Network+    |    Intermediate
  • 13 videos | 1h 8m 50s
  • Earns a Badge
Rating 4.8 of 5 users Rating 4.8 of 5 users (5)
Network security concepts encompass a range of practices, technologies, and policies designed to protect the integrity, confidentiality, and availability of data and resources within a computer network. In this course, explore logical security concepts, including encryption and identity and access management (IAM), as well as physical security controls. Next, learn about security deception technologies and common network security terminology, including confidentiality, integrity, and availability (CIA). Finally, examine network access control solutions, key management concepts, network security rules, and network security zones. This course is one of a collection that helps prepare learners for the CompTIA Network+ (N10-009) certification exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Outline logical security concepts, including encryption, identity and access management (iam), and geofencing
    Identify detective physical security controls like bollards, access badges and cards, security guards, and more
    Differentiate between honeypots and honeynets
    Recognize common network security terminology, including risk, exploits, threats, and the cia triad
    Describe the importance of auditing and regulatory compliance and how to prepare for compliance
    Outline network segmentation and enforcement key concepts
  • Identify device hardening techniques such as changing default passwords and disabling unused ports and services
    Describe network access control (nac) concepts, including port security, 802.1x, and mac filtering
    Recognize how key management is used to ensure the security of cryptographic keys
    Outline the purpose of security rules such as access control lists (acls), url filtering, and content filtering
    Identify the key concepts of network security zones
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 15s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 6m 30s
    Upon completion of this video, you will be able to outline logical security concepts, including encryption, identity and access management (IAM), and geofencing. FREE ACCESS
  • Locked
    3.  Physical Security Controls
    6m 46s
    After completing this video, you will be able to identify detective physical security controls like bollards, access badges and cards, security guards, and more. FREE ACCESS
  • Locked
    4.  Security Deception Technologies
    4m 38s
    In this video, we will differentiate between honeypots and honeynets. FREE ACCESS
  • Locked
    5.  Common Security Terminology
    5m 56s
    Through this video, you will be able to recognize common network security terminology, including risk, exploits, threats, and the CIA triad. FREE ACCESS
  • Locked
    6.  Compliance and Auditing
    5m 8s
    Upon completion of this video, you will be able to describe the importance of auditing and regulatory compliance and how to prepare for compliance. FREE ACCESS
  • Locked
    7.  Network Segmentation and Enforcement
    7m 31s
    Through this video, we will outline network segmentation and enforcement key concepts. FREE ACCESS
  • Locked
    8.  Device Hardening Techniques
    4m 34s
    In this video, we will identify device hardening techniques such as changing default passwords and disabling unused ports and services. FREE ACCESS
  • Locked
    9.  Network Access Control (NAC) Solutions
    6m 34s
    After completing this video, you will be able to describe network access control (NAC) concepts, including port security, 802.1X, and MAC filtering. FREE ACCESS
  • Locked
    10.  Key Management Concepts
    7m 17s
    Through this video, you will be able to recognize how key management is used to ensure the security of cryptographic keys. FREE ACCESS
  • Locked
    11.  Network Security Rules
    6m 41s
    Upon completion of this video, you will be able to outline the purpose of security rules such as access control lists (ACLs), URL filtering, and content filtering. FREE ACCESS
  • Locked
    12.  Network Security Zones
    5m 10s
    After completing this video, you will be able to identify the key concepts of network security zones. FREE ACCESS
  • Locked
    13.  Course Summary
    50s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 7 users Rating 4.6 of 7 users (7)
Rating 4.5 of 81 users Rating 4.5 of 81 users (81)
Rating 4.4 of 5 users Rating 4.4 of 5 users (5)