Network Security and Emerging Technologies
Networking
| Beginner
- 22 videos | 47m 47s
- Includes Assessment
- Earns a Badge
Computer networking is an indispensable tool for single users and large enterprises alike, but unfortunately there are those who want to steal your information or profit off of you. Also, technology changes faster than most of us can keep up with it. In this course, you'll discover the elements of securing networks against attackers, including common security threats, malware, and social engineering. Then you'll learn about the risks of unsecured networks and how attackers compromise networks. You'll explore threat mitigation techniques, types of network security software, VPNs, perimeter networks, intrusion detection systems, security training, and information security planning. You'll learn about emerging technologies, including new wireless technologies and enterprise mobility. Then you'll explore the Internet of Things (IoT) and software defined networks. Finally, you'll discover the importance of keeping up with new technologies and methods for staying current. This course was originally created by Global Knowledge (GK).
WHAT YOU WILL LEARN
-
Identify common security threats to computer networksDescribe malware and the dangers it poses to computer networksDiscuss social engineering and how hackers utilize it to compromise networksDescribe what makes a network unsecured and the threats posed by unsecured networksIdentify common types of network attacksDiscuss crackers and the various meanings of the word 'hacker'Describe the goal of threat mitigation and tools that can be used to reduce vulnerabilitiesDiscuss anti-malware software and how it can be used to reduce threatsDescribe the importance of establishing secure authentication and identify various authentication systemsDiscuss the various categories of user authentication credentials and how they can be used to improve securityDiscuss the purpose of encryption and describe various encryption techniques and technologies
-
Describe the purpose and features of virtual private networks (vpns)Discuss how firewalls are used to secure networksDescribe the purpose and features of perimeter networksDiscuss the purpose and features of intrusion detection systemsDescribe the importance of security training and education and ways that it can be conductedDiscuss the components of an information security planDescribe new wireless technologies and how they'll impact wireless communicationDiscuss how wireless technologies affect enterprises and the issues posed by wireless devicesDescribe the internet of things (iot) and its implicationsDiscuss the purpose and features of software defined networks (sdns)Describe the importance of staying current with new technologies and methods for keeping current
IN THIS COURSE
-
1m 10s
-
1m 53s
-
2m 30s
-
1m 11s
-
2m 35s
-
1m 15s
-
1m 2s
-
2m 8s
-
1m 49s
-
2m 19s
-
3m 24s
-
2m 9s
-
2m 55s
-
2m 51s
-
1m 45s
-
1m 13s
-
1m 32s
-
3m 20s
-
2m 8s
-
2m 52s
-
3m 36s
-
2m 10s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.