Getting Started with Security Architecture

Cybersecurity    |    Beginner
  • 19 videos | 1h 11m 56s
  • Includes Assessment
  • Earns a Badge
Rating 4.7 of 90 users Rating 4.7 of 90 users (90)
Security architecture can be defined as the specifications, processes, and standard operating procedures (SOPs) required to protect an organization's IT infrastructure. In order to improve network security and mitigate risks, a series of network devices can be used to control access to networks and resources. In this course, explore how security architectures can be used to enforce security at the network layer. Explore basic switching and routing devices, and discover core functions of a network intrusion detection systems (NIDS) and host-based intrusion detection systems (HIDS). Explore the characteristics and categories of firewall devices, and learn about networks, intranets, and demilitarized zones. Discover the benefits of network segmentation and learn how to segment networks. Lastly, discover how Network Address Translation (NAT) is used to map addresses, and explore how Network Access Control (NAC) can be used to verify compliance using security policies. This course was originally created by Global Knowledge (GK).

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Define security architectures and recognize how they enforce security at the network layer
    Describe how network devices can be used to control access to a network and its resources
    Provide an overview of routers and basic routing functions
    Recognize how and when to use network switches
    Differentiate between switches and routers
    List core functions of an network intrusion detection system (nids)
    Recognize the purpose of host-based intrusion detection systems (hids)
    List characteristics of network firewalls
    Discuss how firewalls and firewall rules work
  • Differentiate between network zones including internal, internet, and perimeter zones
    List resources commonly installed and configured on an intranet
    Provide an overview of demilitarized zones (dmz)
    List common devices found in a dmz including web servers, ftp servers, email relays, dns servers, and reverse proxy servers
    Discuss the benefits of dividing a large network into smaller logical groups
    Recognize how to segment networks
    List common segmentation concepts used to divide a network
    Describe how network address translation (nat) is used to map addresses
    Describe how network access control (nac) can be used to verify compliance using security policies

IN THIS COURSE

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 123 users Rating 4.6 of 123 users (123)
Rating 4.4 of 5 users Rating 4.4 of 5 users (5)
Rating 4.8 of 5 users Rating 4.8 of 5 users (5)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 30 users Rating 4.6 of 30 users (30)
Rating 4.8 of 27 users Rating 4.8 of 27 users (27)
Rating 4.5 of 441 users Rating 4.5 of 441 users (441)