Learn how to secure an organization's network and keep your interconnected systems and data safe.
Overview
Syllabus
Introduction
- Securing the network
- Discovering resources
- Understanding firewalls
- Comparing advanced networking devices
- Luring with honeypots
- Examining honeypot findings
- Challenge: Exploring honeypot data
- Solution: Exploring honeypot data
- Segmenting using routers and VLANS
- Configuring VLANS
- Creating server and domain isolation
- Translating the network address
- Recognizing perimeter networks
- Configuring NAT
- Summarize cloud concepts
- Connecting to the cloud
- Outlining virtualized technology
- Safeguarding cloud services
- Comparing attack methods
- Attacking passwords
- Sniffing the network
- Spoofing protocols
- Poisoning the ARP cache
- Using antivirus
- Safeguarding DNS
- Securing internet protocol
- Protecting DHCP
- Encrypting data in transit (VPN)
- Assessing security baselines
- Using the principle of least privilege
- Controlling access
- Restricting network access
- Protecting buildings
- Securing hardware
- Challenge: Physical security requirements
- Solution: Physical security requirements
- Summary
Taught by
Jungwoo Ryoo