Security Technologies and Tools Course

2 hours, 27 minutes

Syllabus

Firewalls

Video - 00:24:00

Encompasses the regulation of incoming and outgoing network traffic according to predefined security rules, while Network Segregation involves the implementation of firewalls to establish demilitarized zones (DMZs) and segment networks, thereby augmenting overall security measures.
VPN Concepts

Video - 00:06:00

Encrypting data in transit, especially across unsecured networks, to safeguard against interception, while Remote Access Security focuses on guaranteeing the security of remote connections by employing robust authentication and encryption methods.
Intrusion Detection and Prevention

Video - 00:01:00

Deploying monitoring systems to track network and system activities for any malicious actions or policy violations, while Threat Response involves implementing automated measures to swiftly counter detected threats, thereby preventing data breaches and ensuring prompt remediation.
Network addresses and hardware

Video - 00:14:00

Network addresses are unique identifiers for devices on a network, crucial for routing and communication.
Network Devices

Video - 00:20:00

Network devices such as hubs, switches, and routers are essential components for enabling communication and connectivity in a network.
Load balancers and sensors

Video - 00:18:00

Load balancers distribute incoming network traffic across multiple servers to ensure no single server becomes overwhelmed, enhancing fault tolerance and availability.
Port security

Video - 00:17:00

Ensuring the secure configuration and management of network devices to prevent unauthorized access and maintain data integrity, while Monitoring and Management entails the use of network management tools to observe device performance and uphold security measures.
SIEM

Video - 00:07:00

Aggregating and analyzing log data from diverse sources to detect, prevent, and respond to security threats, while Real-time Monitoring involves the continuous observation of network and system activities to promptly identify and address security incidents as they occur.
DLP

Video - 00:17:00

Implementing strategies and technologies to prevent data breaches, unauthorized data access, and data exfiltration.
NAC

Video - 00:04:00

Enforcing security policies for devices attempting to access the network to ensure compliance with security standards.
Email Security

Video - 00:18:00

Email security involves protecting email communication from threats. Techniques include using mail gateways to filter spam and malicious content, implementing spam filters to block unwanted emails, and using email encryption protocols like PGP and S/MIME to ensure the confidentiality and integrity of email messages.

Unlock 7 days of free training

  • 1,400+ hands-on courses and labs
  • Certification practice exams
  • Skill assessments

Plans & pricing

Infosec Skills Personal

$299 / year

  • 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Custom certification practice exams (e.g., CISSP, Security+)
  • Skill assessments
  • Infosec peer community support

Infosec Skills Teams

$799 per license / year

  • Team administration and reporting
  • Dedicated client success manager
  • Single sign-on (SSO)
    Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
  • Integrations via API
    Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
  • 190+ role-guided learning paths and assessments (e.g., Incident Response)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Create and assign custom learning paths
  • Custom certification practice exams (e.g., CISSP, CISA)
  • Optional upgrade: Guarantee team certification with live boot camps

Learn about scholarships and financing with

Affirm logo

Award-winning training you can trust