CRISC 2023: Firewalls

CRISC    |    Intermediate
  • 10 videos | 51m 36s
  • Includes Assessment
  • Earns a Badge
Rating 5.0 of 3 users Rating 5.0 of 3 users (3)
Security firewalls can determine what type of network traffic to allow or deny into and out of networks and hosts. Intrusion detection systems notify technicians of suspicious activity. Begin this course by discovering firewall types like next-generation firewall (NGFW) and web application firewall (WAF) and examining their use cases. Then you will configure Windows Defender Firewall and learn how to manage a Linux-based firewall solution. Next, you will manage a cloud-based firewall, explore proxy servers, and deploy the Squid proxy server on Linux. Finally, you will investigate intrusion detection and prevention and install Snort on Linux. This course can be used to prepare for the ISACA(r) Certified in Risk and Information Systems Control (CRISC(r)) certification.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Outline the different types of firewalls, including next-generation firewall (ngfw) and web application firewall (waf), their placement, such as in the demilitarized zone (dmz), and when they should be used
    Configure windows defender firewall settings
    Configure linux network firewall settings
    Configure firewall rules in an azure network security group (nsg)
  • Describe the role played by forward and reverse proxy servers
    Install the squid proxy server on linux
    Provide an overview of how intrusion detection systems (idss) and intrusion prevention systems (ipss) solutions address security issues
    Install and configure the snort ids tool
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 58s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 7m 28s
    After completing this video, you will be able to outline the different types of firewalls, including next-generation firewall (NGFW) and web application firewall (WAF), their placement, such as in the demilitarized zone (DMZ), and when they should be used. FREE ACCESS
  • Locked
    3.  Managing Windows Defender Firewall
    5m 48s
    Learn how to configure Windows Defender firewall settings. FREE ACCESS
  • Locked
    4.  Managing a Linux Firewall
    6m 26s
    In this video, find out how to configure Linux network firewall settings. FREE ACCESS
  • Locked
    5.  Managing Cloud Firewalls
    6m 26s
    During this video, discover how to configure firewall rules in an Azure Network Security Group (NSG). FREE ACCESS
  • Locked
    6.  Proxy Servers
    6m 47s
    Upon completion of this video, you will be able to describe the role played by forward and reverse proxy servers. FREE ACCESS
  • Locked
    7.  Deploying the Squid Proxy Server
    5m 8s
    In this video, you will learn how to install the Squid proxy server on Linux. FREE ACCESS
  • Locked
    8.  Intrusion Detection and Prevention
    6m 40s
    After completing this video, you will be able to provide an overview of how intrusion detection systems (IDSs) and intrusion prevention systems (IPSs) solutions address security issues. FREE ACCESS
  • Locked
    9.  Configuring the Snort IDS
    5m 5s
    Find out how to install and configure the Snort IDS tool. FREE ACCESS
  • Locked
    10.  Course Summary
    50s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 5.0 of 2 users Rating 5.0 of 2 users (2)
Rating 5.0 of 2 users Rating 5.0 of 2 users (2)