CRISC 2023: Network Security

CRISC    |    Intermediate
  • 15 videos | 1h 29m 48s
  • Includes Assessment
  • Earns a Badge
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Organizations should secure resource access while remaining compliant with relevant laws and regulations. One way to do this is to ensure proper network security controls are in place and reviewed regularly. In this course, learn about the OSI model layers, their relevance to network security controls, and the security aspects of network switching and network access control. Next, explore DHCP and DNS security issues, Wi-Fi authentication methods, and how to harden a DHCP and DNS deployment on Windows Server. Finally, discover the importance of honeypots and honeynets, how to implement a honeypot, how to analyze captured network traffic, and the purpose of an interconnection security agreement. This course can be used to prepare for the ISACA(r) Certified in Risk and Information Systems Control (CRISC(r)) certification.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Identify how network hardware and software maps to the open systems interconnection (osi) model
    Outline how network switching works, including the use of virtual local area networks (vlans)
    Recognize the most common tcp/ip protocols
    Outline how to plan for ipv4 and ipv6 addressing
    Identify network routing concepts and protocols
    Recognize the security aspects of dhcp and dns
    Implement dhcp and dns security options
  • Name various ways to authenticate to a wi-fi network
    Recognize how virtual private networks (vpns) provide encrypted tunnels to remote networks
    Configure a user vpn with certificate authentication in the cloud
    Outline how the ipsec network security protocol suite protects network traffic
    Use storage account keys and shared access signatures to control storage account access
    Identify items that control network connectivity between entities
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 10s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 8m 58s
    After completing this video, you will be able to identify how network hardware and software maps to the Open Systems Interconnection (OSI) model. FREE ACCESS
  • Locked
    3.  Network Switching and Network Access Control (NAC)
    7m 59s
    Upon completion of this video, you will be able to outline how network switching works, including the use of virtual local area networks (VLANs). FREE ACCESS
  • Locked
    4.  The TCP/IP Protocol Suite
    7m 33s
    In this video, you will recognize the most common TCP/IP protocols. FREE ACCESS
  • Locked
    5.  IP Addressing
    7m 12s
    After completing this video, you will be able to outline how to plan for IPv4 and IPv6 addressing. FREE ACCESS
  • Locked
    6.  Network Routing
    5m 28s
    In this video, we will identify network routing concepts and protocols. FREE ACCESS
  • Locked
    7.  DHCP and DNS Security
    8m 15s
    Upon completion of this video, you will be able to recognize the security aspects of DHCP and DNS. FREE ACCESS
  • Locked
    8.  Implementing DHCP and DNS Security
    7m 7s
    In this video, find out how to implement DHCP and DNS security options. FREE ACCESS
  • Locked
    9.  Wi-Fi Authentication Methods
    6m 33s
    After completing this video, you will be able to name various ways to authenticate to a Wi-Fi network. FREE ACCESS
  • Locked
    10.  Virtual Private Networks (VPNs)
    6m 18s
    In this video, you will recognize how virtual private networks (VPNs) provide encrypted tunnels to remote networks. FREE ACCESS
  • Locked
    11.  Configuring a VPN with Certificate Authentication
    7m 2s
    During this video, discover how to configure a user VPN with certificate authentication in the cloud. FREE ACCESS
  • Locked
    12.  IP Security (IPsec)
    5m 25s
    In this video, we will outline how the IPsec network security protocol suite protects network traffic. FREE ACCESS
  • Locked
    13.  Limiting Microsoft Azure Storage Account Access
    4m 55s
    In this video, you will learn how to use storage account keys and shared access signatures to control storage account access. FREE ACCESS
  • Locked
    14.  Interconnection Security Agreement (ISA)
    4m 55s
    Upon completion of this video, you will be able to identify items that control network connectivity between entities. FREE ACCESS
  • Locked
    15.  Course Summary
    1m
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.8 of 6 users Rating 4.8 of 6 users (6)
Rating 5.0 of 3 users Rating 5.0 of 3 users (3)
Rating 5.0 of 2 users Rating 5.0 of 2 users (2)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 5.0 of 2 users Rating 5.0 of 2 users (2)
Rating 4.5 of 1341 users Rating 4.5 of 1341 users (1341)
Rating 4.6 of 369 users Rating 4.6 of 369 users (369)