Mitigation Techniques

CompTIA    |    Intermediate
  • 13 videos | 1h 20m 19s
  • Includes Assessment
  • Earns a Badge
Rating 4.5 of 29 users Rating 4.5 of 29 users (29)
Mitigating security threats can lessen the overall impact that an attack can have on network devices, hosts, and applications. Explore common mitigation techniques

WHAT YOU WILL LEARN

  • Describe signature management
    Describe device and host hardening
    Recognize when to change native vlans
    Recognize switch port configuration using the spanning tree protocol, bpdu guard, and root guard
    Recognize switch port protection such as arp poisoning, dhcp snooping, and mac filtering
    Describe network segmentation techniques such as dmz and vlan
    Understand when to use privileged user accounts
  • Describe file integrity
    Describe role separation
    Recognize when to use access control lists
    Describe honeypots
    Recognize the benefits of penetration testing
    Implement mitigation techniques

IN THIS COURSE

  • 6m 47s
    After completing this video, you will be able to describe signature management. FREE ACCESS
  • 5m 28s
    Upon completion of this video, you will be able to describe device and host hardening. FREE ACCESS
  • Locked
    3.  VLAN
    5m 12s
    Upon completion of this video, you will be able to recognize when to change the native VLAN. FREE ACCESS
  • Locked
    4.  Switch Port Configuration
    6m 10s
    Upon completion of this video, you will be able to configure switch ports using the Spanning Tree Protocol, BPDU guard, and root guard. FREE ACCESS
  • Locked
    5.  Switch Port Protection
    6m 6s
    Upon completion of this video, you will be able to recognize switch port protections such as ARP poisoning, DHCP snooping, and MAC filtering. FREE ACCESS
  • Locked
    6.  Network Segmentation
    8m 44s
    Upon completion of this video, you will be able to describe network segmentation techniques such as DMZs and VLANs. FREE ACCESS
  • Locked
    7.  Privileged User Accounts
    8m 55s
    Upon completion of this video, you will understand when to use privileged user accounts. FREE ACCESS
  • Locked
    8.  File Integrity
    5m 42s
    After completing this video, you will be able to describe file integrity. FREE ACCESS
  • Locked
    9.  Role Separation
    5m 20s
    After completing this video, you will be able to describe the concept of role separation. FREE ACCESS
  • Locked
    10.  Access Control Lists
    7m 44s
    Upon completion of this video, you will be able to recognize when to use access control lists. FREE ACCESS
  • Locked
    11.  Honeypots
    6m 16s
    After completing this video, you will be able to describe honeypots. FREE ACCESS
  • Locked
    12.  Penetration Testing
    4m 33s
    After completing this video, you will be able to recognize the benefits of penetration testing. FREE ACCESS
  • Locked
    13.  Exercise: Use Mitigation Techniques
    3m 24s
    In this video, find out how to implement mitigation techniques. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 2 users Rating 5.0 of 2 users (2)
Channel Cybersecurity
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 97 users Rating 4.5 of 97 users (97)
Rating 4.5 of 1054 users Rating 4.5 of 1054 users (1054)
Rating 4.4 of 114 users Rating 4.4 of 114 users (114)