Security Technologies and Tools Course
2 hours, 27 minutes
Syllabus
Firewalls
Video - 00:24:00
Encompasses the regulation of incoming and outgoing network traffic according to predefined security rules, while Network Segregation involves the implementation of firewalls to establish demilitarized zones (DMZs) and segment networks, thereby augmenting overall security measures.
VPN Concepts
Video - 00:06:00
Encrypting data in transit, especially across unsecured networks, to safeguard against interception, while Remote Access Security focuses on guaranteeing the security of remote connections by employing robust authentication and encryption methods.
Intrusion Detection and Prevention
Video - 00:01:00
Deploying monitoring systems to track network and system activities for any malicious actions or policy violations, while Threat Response involves implementing automated measures to swiftly counter detected threats, thereby preventing data breaches and ensuring prompt remediation.
Network addresses and hardware
Video - 00:14:00
Network addresses are unique identifiers for devices on a network, crucial for routing and communication.
Network Devices
Video - 00:20:00
Network devices such as hubs, switches, and routers are essential components for enabling communication and connectivity in a network.
Load balancers and sensors
Video - 00:18:00
Load balancers distribute incoming network traffic across multiple servers to ensure no single server becomes overwhelmed, enhancing fault tolerance and availability.
Port security
Video - 00:17:00
Ensuring the secure configuration and management of network devices to prevent unauthorized access and maintain data integrity, while Monitoring and Management entails the use of network management tools to observe device performance and uphold security measures.
SIEM
Video - 00:07:00
Aggregating and analyzing log data from diverse sources to detect, prevent, and respond to security threats, while Real-time Monitoring involves the continuous observation of network and system activities to promptly identify and address security incidents as they occur.
DLP
Video - 00:17:00
Implementing strategies and technologies to prevent data breaches, unauthorized data access, and data exfiltration.
NAC
Video - 00:04:00
Enforcing security policies for devices attempting to access the network to ensure compliance with security standards.
Email Security
Video - 00:18:00
Email security involves protecting email communication from threats. Techniques include using mail gateways to filter spam and malicious content, implementing spam filters to block unwanted emails, and using email encryption protocols like PGP and S/MIME to ensure the confidentiality and integrity of email messages.
Unlock 7 days of free training
- 1,400+ hands-on courses and labs
- Certification practice exams
- Skill assessments
Plans & pricing
Infosec Skills Personal
$299 / year
- 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
- 100s of hands-on labs in cloud-hosted cyber ranges
- Custom certification practice exams (e.g., CISSP, Security+)
- Skill assessments
- Infosec peer community support
Infosec Skills Teams
$799 per license / year
- Team administration and reporting
- Dedicated client success manager
-
Single sign-on (SSO)
Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
-
Integrations via API
Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
- 190+ role-guided learning paths and assessments (e.g., Incident Response)
- 100s of hands-on labs in cloud-hosted cyber ranges
- Create and assign custom learning paths
- Custom certification practice exams (e.g., CISSP, CISA)
- Optional upgrade: Guarantee team certification with live boot camps