Security Best Practices: Network Appliance Security

IT Security    |    Intermediate
  • 14 videos | 1h 32m 14s
  • Includes Assessment
  • Earns a Badge
Rating 4.4 of 29 users Rating 4.4 of 29 users (29)
This course explores the best practices for securing network appliances, and the top network security risks in 14 videos examining best practices for IoT (Internet of things) security risks. You will learn the best practices for transitioning to the Cloud, and the three basic service models IaaS (infrastructure as a service), PaaS (platform as a service), and SaaS (software as a service). Learners will then examine the network perimeter, and security issues and strategies when moving to the Cloud, including how to address de-perimeterization and perimeter exploitation. You will learn about several security architecture models, including Zero Trust Architecture, intrusion kill chain, and the diamond model for intrusion analysis. You will examine the impact of software defined networking, and micro-segmentation to the network security. Learn about next-generation firewalls, network intrusion detection and prevention systems, and distributed denial of service attacks. Finally, you will learn the best practices of Zero Trust Architecture, and how to incorporate them.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Recognize the importance of securing network appliances and the top network security risks
    Recognize best security practices for the internet of things
    Describe the security risks and best practices for transitioning to the cloud
    Recognize traditional infrastructure deficiencies, such as perimeter exploitation and de-perimeterization as a result of moving to the cloud
    Recognize concerns of moving to the security first mindset and de-perimeterization problems
    Describe collaboration-oriented architecture and how it can be used to deal with de-perimeterization
  • Recognize various security architecture models such as the zero trust model, the intrusion kill chain, and the diamond model of intrusion analysis
    Recognize the impact of software defined networking, virtual networking, and micro-segmentation to network security
    Recognize the best security places for network devices such as next generation firewalls, network intrusion detection and prevention systems, and distributed denial of service attacks
    Describe the zero trust architecture and how to apply to the zero trust model
    Recognize zero trust challenges, problems, and concerns
    Recognize and employ best practices for using the zero trust architecture
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 52s
  • 12m 9s
    Upon completion of this video, you will be able to recognize the importance of securing network appliances and the top network security risks. FREE ACCESS
  • Locked
    3.  IoT Security Best Practices
    6m 34s
    Upon completion of this video, you will be able to recognize the best security practices for the Internet of Things. FREE ACCESS
  • Locked
    4.  Transitioning to the Cloud
    10m 59s
    Upon completion of this video, you will be able to describe the security risks and best practices for transitioning to the cloud. FREE ACCESS
  • Locked
    5.  Cloud Perimeter Security Strategies
    8m 21s
    After completing this video, you will be able to recognize traditional infrastructure deficiencies, such as perimeter exploitation and de-perimeterization, as a result of moving to the cloud. FREE ACCESS
  • Locked
    6.  Infrastructure De-perimeterization
    10m 1s
    Upon completion of this video, you will be able to recognize concerns about moving to the security first mindset and de-perimeterization problems. FREE ACCESS
  • Locked
    7.  Collaboration-oriented Architecture
    5m 40s
    After completing this video, you will be able to describe Collaboration-oriented Architecture and how it can be used to deal with de-perimeterization. FREE ACCESS
  • Locked
    8.  Security Architecture Models
    8m 38s
    Upon completion of this video, you will be able to recognize various security architecture models such as the Zero Trust Model, the intrusion kill chain, and the diamond model of intrusion analysis. FREE ACCESS
  • Locked
    9.  Network Architectures
    5m 4s
    After completing this video, you will be able to recognize the impact of software defined networking, virtual networking, and micro-segmentation on network security. FREE ACCESS
  • Locked
    10.  Network Devices Best Security Practices
    6m 53s
    After completing this video, you will be able to recognize the best security places for network devices such as Next Generation Firewalls, Network Intrusion Detection and Prevention Systems, and Distributed Denial of Service Attacks. FREE ACCESS
  • Locked
    11.  Zero Trust Architecture
    5m 43s
    Upon completion of this video, you will be able to describe the Zero Trust Architecture and how to apply the Zero Trust Model. FREE ACCESS
  • Locked
    12.  Zero Trust Concerns
    5m 47s
    After completing this video, you will be able to recognize Zero Trust challenges, problems, and concerns. FREE ACCESS
  • Locked
    13.  Zero Trust Architecture Best Practices
    3m 44s
    Upon completion of this video, you will be able to recognize and employ best practices for using the Zero Trust Architecture. FREE ACCESS
  • Locked
    14.  Course Summary
    49s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.4 of 17 users Rating 4.4 of 17 users (17)
Rating 4.6 of 30 users Rating 4.6 of 30 users (30)
Rating 5.0 of 2 users Rating 5.0 of 2 users (2)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 5137 users Rating 4.5 of 5137 users (5137)
Rating 4.5 of 359 users Rating 4.5 of 359 users (359)
Rating 4.3 of 16 users Rating 4.3 of 16 users (16)