CompTIA Security+: Implementing Secure Network Designs
CompTIA
| Intermediate
- 9 videos | 37m 48s
- Includes Assessment
- Earns a Badge
Networking has always been one of the primary paths to becoming a security expert. This CompTIA Security+ SY0-601 course involves recognizing how to implement secure networking environments and designs. In this course, you'll explore the concepts, techniques, and deployments involved in the following valuable network security technologies: load balancing, networking segmentation/zoning, and virtual private networks. Next, you'll examine several switch port security techniques, such as BPDU guard, DHCP snooping, and MAC filtering. You'll then recognize the various features of firewalls, such as ACLs and WAF, and compare network appliance solutions, such as port spanning, NAC, NIDS, and NIPS. Finally, you'll outline advanced network environment solutions, like route security, IPv6, and next-gen monitoring. This course can be used in preparation for the CompTIA Security+ SY0-601 certification exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDefine network segmentation and zoning concepts, such as a virtual local area network (vlan), pvlan, dmz, east-west traffic, extranets, intranets, and zero-trust deploymentsDescribe various load balancing concepts and techniques, including active/active, active/passive, elastic, scheduling, virtual ip addresses, and persistenceSurvey different vpn deployments, like always-on, split tunnel, full tunnel, remote access, site-to-site, ipsec, ssl/tls, html5, and the layer 2 tunneling protocol (l2tp)Describe port security techniques, as in broadcast storm prevention, loop prevention, bpdu guard, dhcp snooping, and mac filtering
-
Survey the features of firewalls, such as acls, waf, next-generation, stateful vs. stateless, utm, nat gateways, content/url filtering, hardware vs. software, and appliance vs. host-based vs. virtualCompare various network appliance solutions, such as nac, jump/bastion servers, proxy servers, nids, port mirroring/spanning, tapping, nips, signature-based vs. heuristic/behavior vs. anomaly, and inline vs. passive sensors, collectors, and aggregatorsDescribe various advanced networking solutions, like hsm, dns, route security, qos, ipv6 implications, next-gen monitoring and visibility, and file integrity monitoringSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 28s
-
5m 23sDuring this video, you will learn how to define network segmentation and zoning concepts, such as a virtual local area network (VLAN), PVLAN, DMZ, east-west traffic, extranets, intranets, and zero-trust deployments. FREE ACCESS
-
2m 51sAfter completing this video, you will be able to describe various load balancing concepts and techniques, including active/active, active/passive, elastic, scheduling, virtual IP addresses, and persistence. FREE ACCESS
-
7m 32sIn this video, you will learn how to survey different VPN deployments, like always-on, split tunnel, full tunnel, remote access, site-to-site, IPsec, SSL/TLS, HTML5, and the Layer 2 Tunneling Protocol (L2TP). FREE ACCESS
-
4m 48sUpon completion of this video, you will be able to describe port security techniques, such as broadcast storm prevention, loop prevention, BPDU guard, DHCP snooping, and MAC filtering. FREE ACCESS
-
8m 47sFind out how to survey the features of firewalls, such as access control lists (ACLs), web application firewalls (WAF), next-generation, stateful versus stateless, unified threat management (UTM), network address translation (NAT) gateways, content/URL filtering, hardware versus software, and appliance versus host-based versus virtual. FREE ACCESS
-
3m 15sLearn how to compare various network appliance solutions, such as NAC, jump/bastion servers, proxy servers, NIDS, port mirroring/spanning, tapping, NIPS, signature-based vs. heuristic/behavior vs. anomaly, and inline vs. passive sensors, collectors, and aggregators. FREE ACCESS
-
3m 2sUpon completion of this video, you will be able to describe various advanced networking solutions, like HSM, DNS, route security, QoS, IPv6 implications, next-gen monitoring and visibility, and file integrity monitoring. FREE ACCESS
-
42s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.