Security Topologies: Developing Secure Networks
IT Security
| Intermediate
- 14 videos | 1h 1m 25s
- Includes Assessment
- Earns a Badge
Learners can explore secure network challenges and security measures used to configure common tools, in this 14-video course. Familiarize yourself with approaches to configuration with a security mindset and review common security threats and their mitigations. Begin by taking a look at the challenges of a secure-first network design, then describe a network design approach from a security mindset. Examine the challenges to DevOps and Agile mindsets in terms of security decisions, and the network security concerns for hybrid cloud models. Learn how to configure an NGINX HTTP service to prevent insecure file access and configure web application security settings in NGINX. View the dangers of file upload remote execution; use Secure Shell (SSH) as a secure proxy for web browsing from an insecure location, and configure a SSH client to use present server connection settings. Discover how to use local/etc/hosts to block unwanted connections; examine the threat of user account discovery and how it is carried out, and finally, learn how to use password security tools to enforce a strong password policy.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDescribe the challenges of a secure-first network designDescribe a network design approach from a security mindsetDescribe the challenges to devops and agile mindsets in terms of security decisionsDescribe the network security concerns for hybrid cloud modelsConfigure an nginx http service to prevent insecure file accessConfigure web application security settings in nginx
-
Describe the dangers of file upload remote executionUse ssh as a secure proxy for web browsing from an insecure locationConfigure an ssh client to use preset server connection settingsUse the local /etc/hosts to block unwanted connectionsDescribe the threat of user account discovery and how it is carried outUse password security tools to enforce a strong password policySummarize the key concepts covered in this course
IN THIS COURSE
-
1m 34s
-
4m 33sAfter completing this video, you will be able to describe the challenges of a network design that focuses on security. FREE ACCESS
-
2m 57sUpon completion of this video, you will be able to describe a network design approach from a security perspective. FREE ACCESS
-
2m 56sAfter completing this video, you will be able to describe the challenges to security decisions in terms of DevOps and Agile mindsets. FREE ACCESS
-
3m 27sUpon completion of this video, you will be able to describe the network security concerns for hybrid cloud models. FREE ACCESS
-
7m 40sDuring this video, you will learn how to configure an NGINX HTTP service to prevent access to files that are not secure. FREE ACCESS
-
8m 30sIn this video, you will learn how to configure web application security settings in NGINX. FREE ACCESS
-
4m 34sAfter completing this video, you will be able to describe the dangers of remote file execution. FREE ACCESS
-
5m 21sFind out how to use SSH as a secure proxy for web browsing from an insecure location. FREE ACCESS
-
5m 51sIn this video, find out how to configure an SSH client to use preset server connection settings. FREE ACCESS
-
4m 40sIn this video, you will use the local /etc/hosts file to block unwanted connections. FREE ACCESS
-
4m 58sUpon completion of this video, you will be able to describe the threat of user account discovery and how to carry it out. FREE ACCESS
-
3m 14sIn this video, you will use password security tools to enforce a strong password policy. FREE ACCESS
-
1m 11s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.