-
DMZ
-
Mike shows us techniques to use and configure firewalls.
-
-
Introduction to Firewalls
-
In this episode, Mike shows attacks where bad actors function between encrypting hosts.
-
-
Access Control
-
In this episode, Mike discusses techniques for keeping unwanted users out of your network, focusing on effectively using firewalls.
-
-
Malware
-
In this episode, Mike talks about types of malware and what they do.
-
-
Network Troubleshooting
-
Mike closes the series with a review of the troubleshooting steps and how to create a good troubleshooting program.
-
-
High Availability
-
Mike discusses the methods that can be considered to try to maintain 99.99% uptime for critical resources.
-
-
System Monitoring
-
In this episode, Mike explores the type of information we will want to consider when doing network monitoring.
-
-
Standard Business Documentation
-
Mike reminds us that the world of IT is rife with paper.
-
-
SNMP
-
Mike demonstrates a simple but fully functional SNMP network.
-
-
Change Management
-
Mike shows us how the process of managing change to the network works.
-
-
Testing Network Security
-
Learn to scan your network for potential weaknesses in this action-packed episode.
-
-
What is Risk Management?
-
Mike talks about the zen of risk management.
-
-
Hardening Devices
-
In the episode, Mike reminds us that there is more than one way to do a DMZ.
-
-
Firewalls
-
Mike shows us how to keep bad guys from getting into your network from the outside.
-
-
Man-in-the-Middle
-
In this episode, Mike explores man-in-the-middle attacks.
-
-
Social Engineering
-
In this episode, Mike explores social engineering attacks, such as dumpster diving, shoulder surfing and phishing.
-
-
Denial of Service
-
In this episode, Mike discusses attacks that prevent servers from providing their essential services.
-
-
SIEM
-
In this episode, Mike reveals the purpose of security information and event management (SIEM) tools.
-
-
Mitigating Network Threats
-
In this episode, Mike examines the methods that an organization can use to protect its network from both external and internal threats.
-
-
Documenting Logs
-
In this episode, Mike examines the various log files that techs can use to troubleshoot networks. Botanists and woodworkers may be disappointed by this episode’s misleading title.
-
-
User Training
-
In this episode, Mike shows the how, why and when of training users.
-
-
Network Protection Scenarios
-
Mike walks through several scenarios to consider when protecting a network, including how they could block access to services.
-
-
Security Policies
-
In this episode, Mike reviews the types of policies to have in place for the IT department.
-
-
Physical Security Controls
-
In this episode, Mike explores preventative controls, such as guards and fences.
-
Syllabus
Syllabus
Course description
With a network in place, managing it properly is crucial. In this course, you’ll take a closer, in-depth look at the challenges and opportunities in managing a network. Beginning with a look at risk management, you’ll explore security policies, change management, network threats, network security and dangers like malware, social engineering, man-in-the-middle attacks and more.


Meet the author
Mike Meyers, affectionately called the “Alpha Geek,” is the industry’s leading authority on CompTIA certifications. He is the president and co-founder of Total Seminars, LLC, a provider of PC and network repair seminars, books, videos and courseware for thousands of organizations throughout the world. Mike has been involved in the computer and network repair industry since 1987 as a technician, instructor, author, consultant and speaker. He has sold over a million IT and certification books, including the best-selling CompTIA A+ Certification All-in-One Exam Guide and CompTIA Network+ Certification All-in-One Exam Guide. He has personally taught thousands of students, including U.S. senators, U.S. Supreme Court Justices, members of the United Nation, every branch of the U.S. Armed Forces, many branches of the Department of Justice, hundreds of corporate clients and academic students at every level.
You're in good company
We use Infosec Skills to provide continuous training to our technicians and to prepare them for various certifications. Infosec Skills allows us to create personalized training programs that focus on each of our technicians’ particular roles and see their progress as they take courses. We also, recommend it to clients to make their IT support teams better.
Caleb Yankus
This has been utilized to bridge the skills gap across our cyber team and to aid them as they prepare for their various certifications. It also has provided a nice learning foundation for our various cyber team members to utilize as we continue to find ways for cross-utilization with operations while minimizing the downtime needed to ensure everyone’s knowledge is the same.
Daniel Simpson
We use Infosec Skills to provide base level knowledge for employees. We also use the services to provide in depth learning for employees as they encounter new technologies. If an employee is is assigned to a new project, we can rely on Infosec Skills to provide a rapid concentrated learning environment. This rapid concentrated learning positions our employees for success.
Infosec Skills Teams client
Plans & pricing
-
Infosec Skills Personal
- 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
- 100s of hands-on labs in cloud-hosted cyber ranges
- Custom certification practice exams (e.g., CISSP, Security+)
- Skill assessments
- Infosec peer community support
-
Infosec Skills Teams
- Team administration and reporting
- Dedicated client success manager
-
Single sign-on (SSO)
Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
-
Integrations via API
Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
- 190+ role-guided learning paths and assessments (e.g., Incident Response)
- 100s of hands-on labs in cloud-hosted cyber ranges
- Create and assign custom learning paths
- Custom certification practice exams (e.g., CISSP, CISA)
- Optional upgrade: Guarantee team certification with live boot camps
Unlock 7 days of free training
- 1,400+ hands-on courses and labs
- Certification practice exams
- Skill assessments
Award-winning training that you can trust




