Information Security: Subnetting & DNS for Security Architects
IT Security
| Beginner
- 11 videos | 1h 5m 29s
- Includes Assessment
- Earns a Badge
In this 11-video course, learners will discover key concepts related to subnetting, virtual machines (VMs), container, and DNS (domain name system) security. Examine tips and tricks used in subnetting and subnetting advantages. Explore classless inter-domain routing (CIDR), notation, deployment and security considerations for VMs and containers, and types of DNS attacks and mitigation strategies. You will begin the course by taking a look at the importance of subnetting, how it relates to security, and its advantages and disadvantages. Then move on to defining the CIDR notation. You will examine the subnetting cheat sheet, and learn various subnetting tips and tricks; compare VMs and containers, and examine the deployment considerations for VMs and containers. Next, learners will observe the best practices for deploying VMs, and the best practices for VM and container security. In the final two tutorials of this course, you will discover the various types of DNS attacks and their mitigations, and the various types of subnetting attacks and mitigations.
WHAT YOU WILL LEARN
-
Introduce the key concepts of the courseDescribe subnetting and its advantagesDefine the cidr notationRecognize subnetting tips and tricksCompare vms and containersDescribe the deployment considerations for virtual machines and containers
-
Recognize best practices for deploying virtual machinesRecognize best practices for vm and container securityDescribe the various types of dns attacks and their mitigationsRecognize the various types of subnetting attacks and mitigationsSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 42s
-
9m 10sUpon completion of this video, you will be able to describe subnetting and its advantages. FREE ACCESS
-
4m 51sIn this video, you will learn how to define the CIDR notation. FREE ACCESS
-
3m 19sUpon completion of this video, you will be able to recognize subnetting tips and tricks. FREE ACCESS
-
11m 18sIn this video, find out how to compare virtual machines and containers. FREE ACCESS
-
2m 52sAfter completing this video, you will be able to describe the deployment considerations for virtual machines and containers. FREE ACCESS
-
8m 24sUpon completion of this video, you will be able to recognize best practices for deploying virtual machines. FREE ACCESS
-
12m 7sAfter completing this video, you will be able to recognize best practices for VM and container security. FREE ACCESS
-
7m 50sAfter completing this video, you will be able to describe the various types of DNS attacks and their solutions. FREE ACCESS
-
3m 1sUpon completion of this video, you will be able to recognize the various types of subnetting attacks and their mitigations. FREE ACCESS
-
57s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.