Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
When network engineers think of cyber security, they often think of firewalls, intrusion prevention systems, and host-based security systems. Alternatively, service provider security introduces an entirely new set of tools and operating processes.
Service provider security introduces many new tools and techniques, many of which are network-oriented, to secure the carrier’s network environment. In this course, Implementing Service Provider Security and Application Control, you'll learn how to secure SP networks and prioritize traffic using various techniques. First, you'll explore how to build the core network using multiple dual-stacked routing protocols, then harden it with basic security features. Next, you'll delve into developing a distributed denial of service (DDoS) defensive structure using BGP flowspec in conjunction with sinkholes and scrubbing centers. Lastly, you'll discover the three common MPLS quality of service (QoS) models commonly seen within service provider networks, prioritizing important flows while reducing the impact of malicious ones. When you're finished with this course, you'll have the skills necessary to analyze, harden, and optimize the security posture of service provider networks.
Service provider security introduces many new tools and techniques, many of which are network-oriented, to secure the carrier’s network environment. In this course, Implementing Service Provider Security and Application Control, you'll learn how to secure SP networks and prioritize traffic using various techniques. First, you'll explore how to build the core network using multiple dual-stacked routing protocols, then harden it with basic security features. Next, you'll delve into developing a distributed denial of service (DDoS) defensive structure using BGP flowspec in conjunction with sinkholes and scrubbing centers. Lastly, you'll discover the three common MPLS quality of service (QoS) models commonly seen within service provider networks, prioritizing important flows while reducing the impact of malicious ones. When you're finished with this course, you'll have the skills necessary to analyze, harden, and optimize the security posture of service provider networks.