Getting Started with Security Architecture
Cybersecurity
| Beginner
- 19 videos | 1h 11m 56s
- Includes Assessment
- Earns a Badge
Security architecture can be defined as the specifications, processes, and standard operating procedures (SOPs) required to protect an organization's IT infrastructure. In order to improve network security and mitigate risks, a series of network devices can be used to control access to networks and resources. In this course, explore how security architectures can be used to enforce security at the network layer. Explore basic switching and routing devices, and discover core functions of a network intrusion detection systems (NIDS) and host-based intrusion detection systems (HIDS). Explore the characteristics and categories of firewall devices, and learn about networks, intranets, and demilitarized zones. Discover the benefits of network segmentation and learn how to segment networks. Lastly, discover how Network Address Translation (NAT) is used to map addresses, and explore how Network Access Control (NAC) can be used to verify compliance using security policies. This course was originally created by Global Knowledge (GK).
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDefine security architectures and recognize how they enforce security at the network layerDescribe how network devices can be used to control access to a network and its resourcesProvide an overview of routers and basic routing functionsRecognize how and when to use network switchesDifferentiate between switches and routersList core functions of an network intrusion detection system (nids)Recognize the purpose of host-based intrusion detection systems (hids)List characteristics of network firewallsDiscuss how firewalls and firewall rules work
-
Differentiate between network zones including internal, internet, and perimeter zonesList resources commonly installed and configured on an intranetProvide an overview of demilitarized zones (dmz)List common devices found in a dmz including web servers, ftp servers, email relays, dns servers, and reverse proxy serversDiscuss the benefits of dividing a large network into smaller logical groupsRecognize how to segment networksList common segmentation concepts used to divide a networkDescribe how network address translation (nat) is used to map addressesDescribe how network access control (nac) can be used to verify compliance using security policies
IN THIS COURSE
-
31s
-
1m 16s
-
6m 4s
-
4m
-
9m 4s
-
4m 10s
-
5m 43s
-
3m 30s
-
1m 44s
-
2m 48s
-
1m
-
2m 54s
-
4m 1s
-
1m 18s
-
3m 34s
-
4m 49s
-
4m 10s
-
9m 34s
-
1m 47s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.