Course

Managing Risk

With this course on managing the network, you’ll look at risk management, access control, network threats, testing network security and more.

    Syllabus

  • DMZ Video — 00:05:30
    • Mike shows us techniques to use and configure firewalls.

  • Introduction to Firewalls Video — 00:04:30
    • In this episode, Mike shows attacks where bad actors function between encrypting hosts.

  • Access Control Video — 00:08:05
    • In this episode, Mike discusses techniques for keeping unwanted users out of your network, focusing on effectively using firewalls.

  • Malware Video — 00:10:11
    • In this episode, Mike talks about types of malware and what they do.

  • Network Troubleshooting Video — 00:05:12
    • Mike closes the series with a review of the troubleshooting steps and how to create a good troubleshooting program.

  • High Availability Video — 00:04:39
    • Mike discusses the methods that can be considered to try to maintain 99.99% uptime for critical resources.

  • System Monitoring Video — 00:08:01
    • In this episode, Mike explores the type of information we will want to consider when doing network monitoring.

  • Standard Business Documentation Video — 00:05:08
    • Mike reminds us that the world of IT is rife with paper.

  • SNMP Video — 00:15:08
    • Mike demonstrates a simple but fully functional SNMP network.

  • Change Management Video — 00:06:41
    • Mike shows us how the process of managing change to the network works.

  • Testing Network Security Video — 00:07:57
    • Learn to scan your network for potential weaknesses in this action-packed episode.

  • What is Risk Management? Video — 00:06:02
    • Mike talks about the zen of risk management.

  • Hardening Devices Video — 00:13:49
    • In the episode, Mike reminds us that there is more than one way to do a DMZ.

  • Firewalls Video — 00:10:12
    • Mike shows us how to keep bad guys from getting into your network from the outside.

  • Man-in-the-Middle Video — 00:22:07
    • In this episode, Mike explores man-in-the-middle attacks.

  • Social Engineering Video — 00:03:55
    • In this episode, Mike explores social engineering attacks, such as dumpster diving, shoulder surfing and phishing.

  • Denial of Service Video — 00:08:33
    • In this episode, Mike discusses attacks that prevent servers from providing their essential services.

  • SIEM Video — 00:07:06
    • In this episode, Mike reveals the purpose of security information and event management (SIEM) tools.

  • Mitigating Network Threats Video — 00:04:53
    • In this episode, Mike examines the methods that an organization can use to protect its network from both external and internal threats.

  • Documenting Logs Video — 00:09:15
    • In this episode, Mike examines the various log files that techs can use to troubleshoot networks. Botanists and woodworkers may be disappointed by this episode’s misleading title.

  • User Training Video — 00:02:56
    • In this episode, Mike shows the how, why and when of training users.

  • Network Protection Scenarios Video — 00:14:18
    • Mike walks through several scenarios to consider when protecting a network, including how they could block access to services.

  • Security Policies Video — 00:08:28
    • In this episode, Mike reviews the types of policies to have in place for the IT department.

  • Physical Security Controls Video — 00:08:44
    • In this episode, Mike explores preventative controls, such as guards and fences.

Syllabus

Course description

With a network in place, managing it properly is crucial. In this course, you’ll take a closer, in-depth look at the challenges and opportunities in managing a network. Beginning with a look at risk management, you’ll explore security policies, change management, network threats, network security and dangers like malware, social engineering, man-in-the-middle attacks and more.

Meet the author

Mike Meyers, affectionately called the “Alpha Geek,” is the industry’s leading authority on CompTIA certifications. He is the president and co-founder of Total Seminars, LLC, a provider of PC and network repair seminars, books, videos and courseware for thousands of organizations throughout the world. Mike has been involved in the computer and network repair industry since 1987 as a technician, instructor, author, consultant and speaker. He has sold over a million IT and certification books, including the best-selling CompTIA A+ Certification All-in-One Exam Guide and CompTIA Network+ Certification All-in-One Exam Guide. He has personally taught thousands of students, including U.S. senators, U.S. Supreme Court Justices, members of the United Nation, every branch of the U.S. Armed Forces, many branches of the Department of Justice, hundreds of corporate clients and academic students at every level.

You're in good company

CY

We use Infosec Skills to provide continuous training to our technicians and to prepare them for various certifications. Infosec Skills allows us to create personalized training programs that focus on each of our technicians’ particular roles and see their progress as they take courses. We also, recommend it to clients to make their IT support teams better.

Caleb Yankus

DS

This has been utilized to bridge the skills gap across our cyber team and to aid them as they prepare for their various certifications. It also has provided a nice learning foundation for our various cyber team members to utilize as we continue to find ways for cross-utilization with operations while minimizing the downtime needed to ensure everyone’s knowledge is the same.

Daniel Simpson

IS

We use Infosec Skills to provide base level knowledge for employees. We also use the services to provide in depth learning for employees as they encounter new technologies. If an employee is is assigned to a new project, we can rely on Infosec Skills to provide a rapid concentrated learning environment. This rapid concentrated learning positions our employees for success.

Infosec Skills Teams client

Plans & pricing

  • Infosec Skills Personal

    $299 / year

    • 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
    • 100s of hands-on labs in cloud-hosted cyber ranges
    • Custom certification practice exams (e.g., CISSP, Security+)
    • Skill assessments
    • Infosec peer community support
  • Infosec Skills Teams

    $799 per license / year

    • Team administration and reporting
    • Dedicated client success manager
    • Single sign-on (SSO)
      Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
    • Integrations via API
      Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
    • 190+ role-guided learning paths and assessments (e.g., Incident Response)
    • 100s of hands-on labs in cloud-hosted cyber ranges
    • Create and assign custom learning paths
    • Custom certification practice exams (e.g., CISSP, CISA)
    • Optional upgrade: Guarantee team certification with live boot camps

Unlock 7 days of free training

  • 1,400+ hands-on courses and labs
  • Certification practice exams
  • Skill assessments

Award-winning training that you can trust

Comprehensive Cybersecurity Training - Infosec Skills
Cybersecurity Education and Training Gold Award - Infosec IQ
Top Rated Award - Infosec Skills
2021 G2 Summer - Leader - Tech Skills Dev, Online Course, eLearning Content
Top 20 Company - Online Learning Library