About This Course
Course Curriculum
-
The goals of Network defense00:05:00
-
The overview of the different types of network defense approaches00:05:00
-
The different types of Network security controls00:08:00
-
Basic Linux concepts00:03:00
-
The different types of identifications (overview)00:02:00
-
The different types of authentications (overview)00:05:00
-
The different types of authorization (overview)00:03:00
-
Understanding the importance of physical security00:04:00
-
The different physical security attack vectors00:04:00
-
Understanding the various environmental controls00:04:00
-
Understanding Network segmentation and its types00:05:00
-
Understanding the different types of firewalls and their roles00:06:00
-
Understanding the different types of IDS/IPS and their roles00:05:00
-
The different types of proxy servers and their benefits00:04:00
-
Fundementals of VPN and their importance in a network: Part 100:05:00
-
Fundementals of VPN and their importance in a network: Part 200:05:00
-
Overview of antivirus/anti-malware software00:05:00
-
Understanding virtualization and its components00:06:00
-
OS virtualization security00:06:00
-
Cloud computing and its benefits00:04:00
-
Overview of different types of cloud computing service00:05:00
-
Importance of cloud computing and its best practice00:05:00
-
Wireless network encryption mechanism00:05:00
-
Understanding the different types of wireless network authentication methods00:10:00
-
Wireless security measures and wireless security tools00:05:00
-
Understanding IoT architecture and communication models00:10:00
-
Understanding the best practice tool for IoT for security00:06:00
-
Cryptography techniques00:06:00
-
The different Encryption algorithm00:06:00
-
The different hashing algorithm00:05:00
-
Different cryptography tools and hash calculators00:03:00
-
PKI infrastructure00:04:00
-
The different data security controls for data encryption00:24:00
-
File encryption, removable-media encryption and disk encryption00:05:00
-
Methods and tools for data backup retention: Part 100:04:00
-
Methods and tools for data backup retention: Part 200:06:00
-
The implementation of an IDS/IPS (Snort) on a Linux based system00:04:00
-
Installation of snort and its libraries. (Both Linux and ubuntu)00:04:00
-
Configuration of snort for IDS/ IPS functionalities00:04:00
-
Time-zone configuration and swap files in firewall00:03:00
-
How to set-up a VPN00:02:00
-
Firewall configuration00:06:00
-
DLP&S (data loss prevention and solutions)00:04:00