Benefits and Challenges of Network Defense
Network Security Fundamentals
Videos (8):
Course Introduction
Introduction
Goals of Network Defense
Information Assurance (IA) Principles
Benefits and Challenges of Network Defense
Different Types of Network Defense Approaches
Different Types of Network Security Controls
Different Network Security Protocols
========================================================================
Identification, Authentication, and Authorization
Videos (7):
Introduction
Terminology, Principles, and Models of Access Control
Identity and Access Management (IAM)
User Access Management
Different Types of Authentication
Different Types of Authorization
Understanding User Accounting
========================================================================
Week 2: Network Security Controls – Administrative Controls
Videos (7):
Introduction
Why Organizations Need Compliance
Various Regulatory Frameworks, Laws, and Acts
Need for and Characteristics of Good Security Policy
How to Design and Develop Security Policies
Different Types of Security Policies
Different Types of Security and Awareness Training
========================================================================
Network Security Controls – Physical Controls
Videos (7):
Introduction
Importance of Physical Security
Physical Security Attack Vectors
Various Types of Physical Security Controls
Importance of Workplace Security
Overview of Physical Security Policy
Various Environmental Controls
========================================================================
Week 3: Network Security Controls – Technical Controls
Videos (9):
Introduction
Understanding Network Segmentation and its Types
Understanding the Different Types of Firewalls and their Roles
Understanding the Different Types of IDS/IPS and their Roles
Overview of Different Types of Honeypots
Understanding the Different Types of Proxy Servers and their Benefits
Overview of Virtual Private Networks (VPNs) and their Importance in Network Security
Overview of Security Incident and Event Management (SIEM) and User Behavior Analytics (UBA)
Overview of Various Antivirus/Anti-malware Software
Virtualization and Cloud Computing
Videos (8):
Introduction
Understanding Virtualization, its Components, and Virtualization Enablers
Understanding OS Virtualization Security and Concerns
Understanding Cloud Computing and its Benefits
Overview of Different Types of Cloud Computing Services
Overview of Cloud Deployment Models
Understanding Importance of Cloud Security and its Best Practices
Practice Quiz: Understanding Importance of Cloud Security and its Best Practices
Week 4: Wireless Network Security
Videos (7):
Introduction
Understanding the Wireless Terminology, Wireless Networks, and Wireless Standards
Understanding the Wireless Network Topologies and Classification of Wireless Networks
Understanding the Components of a Wireless Network
Overview of Wireless Network Encryption Mechanisms
Understanding the Different Types of Wireless Network Authentication Methods
Understanding Wireless Network Security Measures and Wireless Security Tools
Mobile Device Security
Videos (7):
Introduction
Understanding the Various Mobile Device Connection Methods
Understanding the Concepts of Mobile Device Management
Understanding the Common Mobile Use Approaches in Enterprises
Understand the Security Risk and Guidelines Associated with Enterprises Mobile Usage Policies
Understanding Enterprise-level Mobile Security Management Solutions
Understanding the General Security Guidelines and Best Practices for Mobile Platforms
Week 5: IoT Device Security
Videos (8):
Introduction
Understanding the IoT and Why Organizations Opt for IoT-enabled Environments
Overview of IoT Application Areas and IoT Devices
Understanding the IoT Architecture and IoT Communication Models
Understanding the Security in IoT-Enabled Environments
Understanding the Security Considerations of the IoT Framework
Overview of IoT Device Management
Understanding the Best Practices and Tools for IoT Security
Cryptography and PKI
Videos (6):
Introduction
Understanding Cryptographic Techniques
Understanding the Different Encryption Algorithms
Understanding the Different Hashing Algorithms
Overview of Different Cryptography Tools and Hash Calculators
Understanding Public Key Infrastructure (PKI), Digital Signatures and Digital Certificates
Week 6: Data Security
Videos (7):
Introduction
Understanding Data Security and its Importance
Different Data Security Technologies
Disk Encryption, File Encryption, and Removable-media Encryption Tools
Methods and Tools for Data Backup and Retention
Data Loss Prevention (DLP) and DLP Solutions
Network Traffic Monitoring
Videos (7):
Introduction
Need for and Advantages of Network Traffic Monitoring
Network Traffic Signatures
Categories of Suspicious Traffic Signatures
Attack Signature Analysis Techniques
Network Monitoring for Suspicious Traffic
Various Network Monitoring Tools
[ad_2]
source