Mitigation Techniques
CompTIA
| Intermediate
- 13 videos | 1h 20m 19s
- Includes Assessment
- Earns a Badge
Mitigating security threats can lessen the overall impact that an attack can have on network devices, hosts, and applications. Explore common mitigation techniques
WHAT YOU WILL LEARN
-
Describe signature managementDescribe device and host hardeningRecognize when to change native vlansRecognize switch port configuration using the spanning tree protocol, bpdu guard, and root guardRecognize switch port protection such as arp poisoning, dhcp snooping, and mac filteringDescribe network segmentation techniques such as dmz and vlanUnderstand when to use privileged user accounts
-
Describe file integrityDescribe role separationRecognize when to use access control listsDescribe honeypotsRecognize the benefits of penetration testingImplement mitigation techniques
IN THIS COURSE
-
6m 47sAfter completing this video, you will be able to describe signature management. FREE ACCESS
-
5m 28sUpon completion of this video, you will be able to describe device and host hardening. FREE ACCESS
-
5m 12sUpon completion of this video, you will be able to recognize when to change the native VLAN. FREE ACCESS
-
6m 10sUpon completion of this video, you will be able to configure switch ports using the Spanning Tree Protocol, BPDU guard, and root guard. FREE ACCESS
-
6m 6sUpon completion of this video, you will be able to recognize switch port protections such as ARP poisoning, DHCP snooping, and MAC filtering. FREE ACCESS
-
8m 44sUpon completion of this video, you will be able to describe network segmentation techniques such as DMZs and VLANs. FREE ACCESS
-
8m 55sUpon completion of this video, you will understand when to use privileged user accounts. FREE ACCESS
-
5m 42sAfter completing this video, you will be able to describe file integrity. FREE ACCESS
-
5m 20sAfter completing this video, you will be able to describe the concept of role separation. FREE ACCESS
-
7m 44sUpon completion of this video, you will be able to recognize when to use access control lists. FREE ACCESS
-
6m 16sAfter completing this video, you will be able to describe honeypots. FREE ACCESS
-
4m 33sAfter completing this video, you will be able to recognize the benefits of penetration testing. FREE ACCESS
-
3m 24sIn this video, find out how to implement mitigation techniques. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.