Managing Risk

With this course on managing the network, you'll look at risk management, access control, network threats, testing network security and more.

24 videos  //  201 minutes of training

Free training week — 1,400+ on-demand courses and hands-on labs

Course description

With a network in place, managing it properly is crucial. In this course, you’ll take a closer, in-depth look at the challenges and opportunities in managing a network. Beginning with a look at risk management, you’ll explore security policies, change management, network threats, network security and dangers like malware, social engineering, man-in-the-middle attacks and more.

Course syllabus

What is Risk Management?Duration: 6:02

Mike talks about the zen of risk management.

Security PoliciesDuration: 8:28

In this episode, Mike reviews the types of policies to have in place for the IT department.

Change ManagementDuration: 6:41

Mike shows us how the process of managing change to the network works.

User TrainingDuration: 2:56

In this episode, Mike shows the how, why and when of training users.

Standard Business DocumentationDuration: 5:08

Mike reminds us that the world of IT is rife with paper.

Mitigating Network ThreatsDuration: 4:53

In this episode, Mike examines the methods that an organization can use to protect its network from both external and internal threats.

High AvailabilityDuration: 4:39

Mike discusses the methods that can be considered to try to maintain 99.99% uptime for critical resources.

Denial-of-ServiceDuration: 8:33

In this episode, Mike discusses attacks that prevent servers from providing their essential services.

MalwareDuration: 10:11

In this episode, Mike talks about types of malware and what they do.

Social EngineeringDuration: 3:55

In this episode, Mike explores social engineering attacks, such as dumpster diving, shoulder surfing and phishing.

Access ControlDuration: 8:05

In this episode, Mike discusses techniques for keeping unwanted users out of your network, focusing on effectively using firewalls.

Man-in-the-MiddleDuration: 22:07

In this episode, Mike explores man-in-the-middle attacks.

Introduction to FirewallsDuration: 4:30

In this episode, Mike shows attacks where bad actors function between encrypting hosts.

FirewallsDuration: 10:12

Mike shows us how to keep bad guys from getting into your network from the outside.

DMZDuration: 5:30

Mike shows us techniques to use and configure firewalls.

Hardening DevicesDuration: 13:49

In the episode, Mike reminds us that there is more than one way to do a DMZ.

Physical Security ControlsDuration: 8:44

In this episode, Mike explores preventative controls, such as guards and fences.

Testing Network SecurityDuration: 7:57

Learn to scan your network for potential weaknesses in this action-packed episode.

Network Protection ScenariosDuration: 14:18

Mike walks through several scenarios to consider when protecting a network, including how they could block access to services.

SNMPDuration: 15:08

Mike demonstrates a simple but fully functional SNMP network.

Documenting LogsDuration: 9:15

In this episode, Mike examines the various log files that techs can use to troubleshoot networks. Botanists and woodworkers may be disappointed by this episode's misleading title.

System MonitoringDuration: 8:01

In this episode, Mike explores the type of information we will want to consider when doing network monitoring.

SIEMDuration: 7:06

In this episode, Mike reveals the purpose of security information and event management (SIEM) tools.

Network TroubleshootingDuration: 5:12

Mike closes the series with a review of the troubleshooting steps and how to create a good troubleshooting program.

Meet the author

Mike Meyers

LinkedIn

Mike Meyers, affectionately called the "Alpha Geek," is the industry's leading authority on CompTIA certifications. He is the president and co-founder of Total Seminars, LLC, a provider of PC and network repair seminars, books, videos and courseware for thousands of organizations throughout the world. Mike has been involved in the computer and network repair industry since 1987 as a technician, instructor, author, consultant and speaker. He has sold over a million IT and certification books, including the best-selling CompTIA A+ Certification All-in-One Exam Guide and CompTIA Network+ Certification All-in-One Exam Guide. He has personally taught thousands of students, including U.S. senators, U.S. Supreme Court Justices, members of the United Nation, every branch of the U.S. Armed Forces, many branches of the Department of Justice, hundreds of corporate clients and academic students at every level.

Plans & pricing

Infosec Skills Personal

  • 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Custom certification practice exams (e.g., CISSP, Security+)
  • Skill assessments
  • Infosec peer community support

Infosec Skills Teams

$799 per license / year

Book a Meeting
  • Team administration and reporting
  • Single sign-on (SSO)
    Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
  • API
    Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
  • 190+ role-guided learning paths (e.g., Incident Response)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Custom certification practice exams (e.g., CISSP, CISA)
  • Skill assessments
  • Create and assign custom learning paths
  • Dedicated client success manager

Award-winning training that you can trust

IDC MarketScape Leader: U.S. IT Training

IDC MarketScape Leader: U.S. IT Training

Infosec Skills

eLearning Content

eLearning Content

Infosec Skills

Best Product - Cybersecurity Training for Infosec Professionals

Best Product - Cybersecurity Training for Infosec Professionals

Infosec Skills

Security Education & Platform

Security Education & Platform

Infosec Skills

Ranked #52 in Top 100 Global Software Sellers

Ranked #52 in Top 100 Global Software Sellers

Infosec