With a network in place, managing it properly is crucial. In this course, you’ll take a closer, in-depth look at the challenges and opportunities in managing a network. Beginning with a look at risk management, you’ll explore security policies, change management, network threats, network security and dangers like malware, social engineering, man-in-the-middle attacks and more.
What is Risk Management?Duration: 6:02
Mike talks about the zen of risk management.
Security PoliciesDuration: 8:28
In this episode, Mike reviews the types of policies to have in place for the IT department.
Change ManagementDuration: 6:41
Mike shows us how the process of managing change to the network works.
User TrainingDuration: 2:56
In this episode, Mike shows the how, why and when of training users.
Standard Business DocumentationDuration: 5:08
Mike reminds us that the world of IT is rife with paper.
Mitigating Network ThreatsDuration: 4:53
In this episode, Mike examines the methods that an organization can use to protect its network from both external and internal threats.
High AvailabilityDuration: 4:39
Mike discusses the methods that can be considered to try to maintain 99.99% uptime for critical resources.
Denial of ServiceDuration: 8:33
In this episode, Mike discusses attacks that prevent servers from providing their essential services.
In this episode, Mike talks about types of malware and what they do.
Social EngineeringDuration: 3:55
In this episode, Mike explores social engineering attacks, such as dumpster diving, shoulder surfing and phishing.
Access ControlDuration: 8:05
In this episode, Mike discusses techniques for keeping unwanted users out of your network, focusing on effectively using firewalls.
In this episode, Mike explores man-in-the-middle attacks.
Introduction to FirewallsDuration: 4:30
In this episode, Mike shows attacks where bad actors function between encrypting hosts.
Mike shows us how to keep bad guys from getting into your network from the outside.
Mike shows us techniques to use and configure firewalls.
Hardening DevicesDuration: 13:49
In the episode, Mike reminds us that there is more than one way to do a DMZ.
Physical Security ControlsDuration: 8:44
In this episode, Mike explores preventative controls, such as guards and fences.
Testing Network SecurityDuration: 7:57
Learn to scan your network for potential weaknesses in this action-packed episode.
Network Protection ScenariosDuration: 14:18
Mike walks through several scenarios to consider when protecting a network, including how they could block access to services.
Mike demonstrates a simple but fully functional SNMP network.
Documenting LogsDuration: 9:15
In this episode, Mike examines the various log files that techs can use to troubleshoot networks. Botanists and woodworkers may be disappointed by this episode's misleading title.
System MonitoringDuration: 8:01
In this episode, Mike explores the type of information we will want to consider when doing network monitoring.
In this episode, Mike reveals the purpose of security information and event management (SIEM) tools.
Network TroubleshootingDuration: 5:12
Mike closes the series with a review of the troubleshooting steps and how to create a good troubleshooting program.
Meet the author
Mike Meyers, affectionately called the "Alpha Geek," is the industry's leading authority on CompTIA certifications. He is the president and co-founder of Total Seminars, LLC, a provider of PC and network repair seminars, books, videos and courseware for thousands of organizations throughout the world. Mike has been involved in the computer and network repair industry since 1987 as a technician, instructor, author, consultant and speaker. He has sold over a million IT and certification books, including the best-selling CompTIA A+ Certification All-in-One Exam Guide and CompTIA Network+ Certification All-in-One Exam Guide. He has personally taught thousands of students, including U.S. senators, U.S. Supreme Court Justices, members of the United Nation, every branch of the U.S. Armed Forces, many branches of the Department of Justice, hundreds of corporate clients and academic students at every level.
You're in good company
Infosec Skills is a very good place for building technical acumen and engineering development knowledge. It enables us to provide training to the entire team on relevant topics.
Romy Ricafort, West Division Senior Director of Sales Engineering
Comparing Infosec to other vendors is like comparing apples to oranges. My instructor was hands-down the best I've had.
James Coyle , Senior U.S. Public Sector Channel Sales Engineer
Train on your schedule
- 600+ courses
- 100s of hands-on labs and projects
- 70+ role-based learning paths
- Skill assessments
- Custom learning paths
- Custom certification practice exams
- Cloud-hosted cyber ranges
- Infosec peer community support
Infosec Skills Teams
- All Infosec Skills content for the year
- Team boot camp discounts — online or onsite (not included with subscription)
- Team administration and reporting
- Custom team learning paths
- Transferable licenses
- Dedicated client success manager
Award-winning training that you can trust
Best Software - Highest Satisfaction
Best IT Security-related Training Program
Best Cybersecurity Education Provider & Best Security Education Platform
Most Innovative Product - Cybersecurity Training for Infosec Professionals
Global Excellence - Cyber Security Education & Training
Exceptional learning experiences powered by LX Labs cyber expertise
Infosec Skills courses and labs are powered by LX Labs — our elite team of cyber SMEs, learning specialists and community of top-ranked security instructors, published authors and sought-after industry leaders. We rigorously vet all Infosec Skills training resources to guarantee they meet certification and compliance requirements and align with recognized guidelines like the NICE Cybersecurity Workforce Framework.