4.1 – Network Security Concepts
Security Concepts
Information security is a broad field with many security concepts. In this video, you’ll learn about the states of data, digital certificates, certificate authorities, identify and access management (IAM), and much more.
Authentication
The authentication process is an important part of any infrastructure. In this video, you’ll learn about single sign-on, RADIUS, LDAP, SAML, and other authentication technologies.
Security Technologies
There are many ways to help secure the enterprise. In this video, you’ll learn about honeypots and honeynets, risk, vulnerabilities, exploits, threats, and the CIA triad.
Regulatory Compliance
Almost every organization must manage compliance. In this video, you’ll learn about compliance requirements associated with data localization, the General Data Protection Regulation (GDPR), and the Payment Card Industry Data Security Standard (PCI DSS).
Segmentation Enforcement
Segmentation can be an important method of managing security. In this video, you’ll learn about Internet of Things (IoT) segmentation, SCADA, operational technology, guest networks, and BYOD.
4.2 – Attack Types
Denial of Service
Some attackers would like your servers and networks to fail. In this video, you’ll learn about denial of service and how DoS amplification can be used to bring down a system with minimal resources.
VLAN Hopping
In most cases, it’s not possible to jump from one VLAN to another without a router. In this video, you’ll learn how attackers can use switch spoofing and double tagging to hop between VLANs.
MAC Flooding
An attacker can sometimes convince a switch to send information to places it normally wouldn’t. In this video, you’ll learn how MAC flooding can be used to turn a switch into a hub.
ARP and DNS Poisoning
Gaining access to a traffic flow can be challenging for any attacker. In this video, you’ll learn how ARP poisoning and DNS poisoning can be used to perform on-path network attacks.
Rogue Services
Gaining access to a traffic flow can be challenging for any attacker. In this video, you’ll learn how ARP poisoning and DNS poisoning can be used to perform on-path network attacks.
Social Engineering
Attackers often use social engineering techniques to subvert existing security controls. In this video, you’ll learn about phishing, shoulder surfing, tailgating, piggybacking, and dumpster diving.
Malware
Malicious software can cause significant damage to nearly any system or network. In this video, you’ll learn about different malware types and how attackers use ransomware to encrypt data and extort users for financial gain.
4.3 – Network Security Features
Device Security
There are many best practices for keeping devices safe. In this video, you’ll learn about disabling ports, changing default credentials, MAC filtering, and much more
Security Rules
We often use rules to allow or prevent access to important resources. In this video, you’ll learn about access control lists, firewall rules, content filtering, screened subnets, and security zones.