Information Security: Subnetting & DNS for Security Architects

IT Security    |    Beginner
  • 11 videos | 1h 5m 29s
  • Includes Assessment
  • Earns a Badge
Rating 4.2 of 19 users Rating 4.2 of 19 users (19)
In this 11-video course, learners will discover key concepts related to subnetting, virtual machines (VMs), container, and DNS (domain name system) security. Examine tips and tricks used in subnetting and subnetting advantages. Explore classless inter-domain routing (CIDR), notation, deployment and security considerations for VMs and containers, and types of DNS attacks and mitigation strategies. You will begin the course by taking a look at the importance of subnetting, how it relates to security, and its advantages and disadvantages. Then move on to defining the CIDR notation. You will examine the subnetting cheat sheet, and learn various subnetting tips and tricks; compare VMs and containers, and examine the deployment considerations for VMs and containers. Next, learners will observe the best practices for deploying VMs, and the best practices for VM and container security. In the final two tutorials of this course, you will discover the various types of DNS attacks and their mitigations, and the various types of subnetting attacks and mitigations.

WHAT YOU WILL LEARN

  • Introduce the key concepts of the course
    Describe subnetting and its advantages
    Define the cidr notation
    Recognize subnetting tips and tricks
    Compare vms and containers
    Describe the deployment considerations for virtual machines and containers
  • Recognize best practices for deploying virtual machines
    Recognize best practices for vm and container security
    Describe the various types of dns attacks and their mitigations
    Recognize the various types of subnetting attacks and mitigations
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 42s
  • 9m 10s
    Upon completion of this video, you will be able to describe subnetting and its advantages. FREE ACCESS
  • Locked
    3.  The CIDR Notation
    4m 51s
    In this video, you will learn how to define the CIDR notation. FREE ACCESS
  • Locked
    4.  Tips and Tricks in Subnetting
    3m 19s
    Upon completion of this video, you will be able to recognize subnetting tips and tricks. FREE ACCESS
  • Locked
    5.  VMs and Containers
    11m 18s
    In this video, find out how to compare virtual machines and containers. FREE ACCESS
  • Locked
    6.  Deployment Considerations for VMs and Containers
    2m 52s
    After completing this video, you will be able to describe the deployment considerations for virtual machines and containers. FREE ACCESS
  • Locked
    7.  Best Practices for Deploying VMs
    8m 24s
    Upon completion of this video, you will be able to recognize best practices for deploying virtual machines. FREE ACCESS
  • Locked
    8.  Best Practices for VM and Container Security
    12m 7s
    After completing this video, you will be able to recognize best practices for VM and container security. FREE ACCESS
  • Locked
    9.  Types of DNS Attacks and their Mitigations
    7m 50s
    After completing this video, you will be able to describe the various types of DNS attacks and their solutions. FREE ACCESS
  • Locked
    10.  Types of Subnetting Attacks and Mitigations
    3m 1s
    Upon completion of this video, you will be able to recognize the various types of subnetting attacks and their mitigations. FREE ACCESS
  • Locked
    11.  Course Summary
    57s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 1991 users Rating 4.6 of 1991 users (1991)
Rating 4.3 of 16 users Rating 4.3 of 16 users (16)
Rating 4.4 of 60 users Rating 4.4 of 60 users (60)