Security Best Practices: Network Appliance Security
IT Security
| Intermediate
- 14 videos | 1h 32m 14s
- Includes Assessment
- Earns a Badge
This course explores the best practices for securing network appliances, and the top network security risks in 14 videos examining best practices for IoT (Internet of things) security risks. You will learn the best practices for transitioning to the Cloud, and the three basic service models IaaS (infrastructure as a service), PaaS (platform as a service), and SaaS (software as a service). Learners will then examine the network perimeter, and security issues and strategies when moving to the Cloud, including how to address de-perimeterization and perimeter exploitation. You will learn about several security architecture models, including Zero Trust Architecture, intrusion kill chain, and the diamond model for intrusion analysis. You will examine the impact of software defined networking, and micro-segmentation to the network security. Learn about next-generation firewalls, network intrusion detection and prevention systems, and distributed denial of service attacks. Finally, you will learn the best practices of Zero Trust Architecture, and how to incorporate them.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseRecognize the importance of securing network appliances and the top network security risksRecognize best security practices for the internet of thingsDescribe the security risks and best practices for transitioning to the cloudRecognize traditional infrastructure deficiencies, such as perimeter exploitation and de-perimeterization as a result of moving to the cloudRecognize concerns of moving to the security first mindset and de-perimeterization problemsDescribe collaboration-oriented architecture and how it can be used to deal with de-perimeterization
-
Recognize various security architecture models such as the zero trust model, the intrusion kill chain, and the diamond model of intrusion analysisRecognize the impact of software defined networking, virtual networking, and micro-segmentation to network securityRecognize the best security places for network devices such as next generation firewalls, network intrusion detection and prevention systems, and distributed denial of service attacksDescribe the zero trust architecture and how to apply to the zero trust modelRecognize zero trust challenges, problems, and concernsRecognize and employ best practices for using the zero trust architectureSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 52s
-
12m 9sUpon completion of this video, you will be able to recognize the importance of securing network appliances and the top network security risks. FREE ACCESS
-
6m 34sUpon completion of this video, you will be able to recognize the best security practices for the Internet of Things. FREE ACCESS
-
10m 59sUpon completion of this video, you will be able to describe the security risks and best practices for transitioning to the cloud. FREE ACCESS
-
8m 21sAfter completing this video, you will be able to recognize traditional infrastructure deficiencies, such as perimeter exploitation and de-perimeterization, as a result of moving to the cloud. FREE ACCESS
-
10m 1sUpon completion of this video, you will be able to recognize concerns about moving to the security first mindset and de-perimeterization problems. FREE ACCESS
-
5m 40sAfter completing this video, you will be able to describe Collaboration-oriented Architecture and how it can be used to deal with de-perimeterization. FREE ACCESS
-
8m 38sUpon completion of this video, you will be able to recognize various security architecture models such as the Zero Trust Model, the intrusion kill chain, and the diamond model of intrusion analysis. FREE ACCESS
-
5m 4sAfter completing this video, you will be able to recognize the impact of software defined networking, virtual networking, and micro-segmentation on network security. FREE ACCESS
-
6m 53sAfter completing this video, you will be able to recognize the best security places for network devices such as Next Generation Firewalls, Network Intrusion Detection and Prevention Systems, and Distributed Denial of Service Attacks. FREE ACCESS
-
5m 43sUpon completion of this video, you will be able to describe the Zero Trust Architecture and how to apply the Zero Trust Model. FREE ACCESS
-
5m 47sAfter completing this video, you will be able to recognize Zero Trust challenges, problems, and concerns. FREE ACCESS
-
3m 44sUpon completion of this video, you will be able to recognize and employ best practices for using the Zero Trust Architecture. FREE ACCESS
-
49s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.YOU MIGHT ALSO LIKE
Audiobook
Cybersecurity All-in-One For Dummies