With a network in place, managing it properly is crucial. In this course, you’ll take a closer, in-depth look at the challenges and opportunities in managing a network. Beginning with a look at risk management, you’ll explore security policies, change management, network threats, network security and dangers like malware, social engineering, man-in-the-middle attacks and more.
What is Risk Management?Duration: 6:02
Mike talks about the zen of risk management.
Security PoliciesDuration: 8:28
In this episode, Mike reviews the types of policies to have in place for the IT department.
Change ManagementDuration: 6:41
Mike shows us how the process of managing change to the network works.
User TrainingDuration: 2:56
In this episode, Mike shows the how, why and when of training users.
Standard Business DocumentationDuration: 5:08
Mike reminds us that the world of IT is rife with paper.
Mitigating Network ThreatsDuration: 4:53
In this episode, Mike examines the methods that an organization can use to protect its network from both external and internal threats.
High AvailabilityDuration: 4:39
Mike discusses the methods that can be considered to try to maintain 99.99% uptime for critical resources.
In this episode, Mike discusses attacks that prevent servers from providing their essential services.
In this episode, Mike talks about types of malware and what they do.
Social EngineeringDuration: 3:55
In this episode, Mike explores social engineering attacks, such as dumpster diving, shoulder surfing and phishing.
Access ControlDuration: 8:05
In this episode, Mike discusses techniques for keeping unwanted users out of your network, focusing on effectively using firewalls.
In this episode, Mike explores man-in-the-middle attacks.
Introduction to FirewallsDuration: 4:30
In this episode, Mike shows attacks where bad actors function between encrypting hosts.
Mike shows us how to keep bad guys from getting into your network from the outside.
Mike shows us techniques to use and configure firewalls.
Hardening DevicesDuration: 13:49
In the episode, Mike reminds us that there is more than one way to do a DMZ.
Physical Security ControlsDuration: 8:44
In this episode, Mike explores preventative controls, such as guards and fences.
Testing Network SecurityDuration: 7:57
Learn to scan your network for potential weaknesses in this action-packed episode.
Network Protection ScenariosDuration: 14:18
Mike walks through several scenarios to consider when protecting a network, including how they could block access to services.
Mike demonstrates a simple but fully functional SNMP network.
Documenting LogsDuration: 9:15
In this episode, Mike examines the various log files that techs can use to troubleshoot networks. Botanists and woodworkers may be disappointed by this episode's misleading title.
System MonitoringDuration: 8:01
In this episode, Mike explores the type of information we will want to consider when doing network monitoring.
In this episode, Mike reveals the purpose of security information and event management (SIEM) tools.
Network TroubleshootingDuration: 5:12
Mike closes the series with a review of the troubleshooting steps and how to create a good troubleshooting program.