Course description
In this course we will discuss the plethora of security devices found on the network. As a security professional you need to understand how these devices work, the methods used to implement security, and the design considerations needed when deploying them. We will cover all of these topics while keeping our focus on the security of the network. Security should be at the forefront of priorities, not an afterthought. This class will be a step in becoming a security conscientious individual. This course will cover the CompTIA Security+ objectives 1.1, 1.2, and 1.3.
Each LearnNowOnline training course is made up of Modules (typically an hour in length). Within each module there are Topics (typically 15-30 minutes each) and Subtopics (typically 2-5 minutes each). There is a Post Exam for each Module that must be passed with a score of 70% or higher to successfully and fully complete the course.
Prerequisites
This course assumes that the user has working knowledge of networks and networking. Ideally, the user should have their CompTIA Network+ certification, but can be replaced with networking experience.
Meet the expert
Ryan Hendricks
Ryan Hendricks is an experienced instructor who teaches networking and security courses to IT professionals throughout the nation. He currently has the CompTIA Certified Technical Trainer (CTT+ Classroom) and the Cisco Certified Academy Instructor (CCAI) credentials. He holds certifications from (ISC)2, EC-Council, CompTIA, and Cisco. When not on the podium instructing, he delves into IT books, always looking to learn more and keep up with the latest security topics.
Video Runtime
117 Minutes
Time to complete
137 Minutes
Course Outline
Network Security
Devices (27:57)
- Introduction (00:21)
- Switches (02:27)
- Switches, Cont. (02:27)
- Routers (01:55)
- Routers, Cont. (01:19)
- Firewalls (01:04)
- Firewalls, Cont. (01:39)
- Packet Filtering Firewall (01:30)
- Packet Filtering Firewall, Cont. (01:29)
- Stateful Firewall (01:43)
- Stateful Firewall, Cont. (00:56)
- Application Based Firewall (00:55)
- App Based Firewall, Cont. (01:19)
- Web Application Firewall (02:45)
- Load Balancer (01:09)
- Proxies (01:34)
- Web Security Gateway (00:55)
- VPN Concentrator (01:53)
- Summary (00:28)
Devices 2 (20:26)
- Introduction (00:24)
- Intrusion Detection & Prevention (01:24)
- IDS & IPS Rules (01:16)
- IDS & IPS Rules, Example (02:30)
- Network IDS & IPS Placement (01:23)
- Detection Techniques (01:32)
- Detection Techniques, Cont. (04:24)
- Protocol Analyzer (00:54)
- Protocol Analyzer, Cont. (00:43)
- Spam Filter (01:55)
- Unified Threat Management (01:30)
- URL Filtering (00:23)
- Content Inspection (00:20)
- Malware Inspection (00:33)
- Application Aware Devices (00:43)
- Summary (00:25)
Administration (37:28)
- Introduction (00:27)
- Rule-Based Management (03:08)
- Rule Definitions, Cont. (00:52)
- Explicit and Implicit Rules (00:48)
- Firewall Rules (00:41)
- Firewall Rules, Cont. (00:27)
- Firewall Illustration (01:18)
- VLAN Management (01:27)
- VLAN Illustration (01:24)
- VLANs (01:22)
- Secure Router Configuration (02:23)
- Access Control List (01:17)
- ACLs, Cont. (00:44)
- Port Security (00:46)
- Port Security, Cont. (01:49)
- 802.1x (01:33)
- 802.1x, Cont. (01:05)
- Flood Guards (00:39)
- Loop Protection (00:41)
- Loop Protection, Cont. (01:09)
- Network Separation (00:22)
- Network Separation, Cont. (00:51)
- Log Analysis (00:47)
- Log Analysis, Cont. (01:40)
- Demo: Firewall Rules (03:28)
- Demo: New Firewall Rule (05:49)
- Summary (00:20)
Design (31:23)
- Introduction (00:20)
- Demilitarized Zone (00:34)
- DMZ illustration (00:41)
- DMZ Devices (01:30)
- Subnetting (01:50)
- VLANs (00:49)
- VLAN Illustration (02:13)
- Network Address Translation (02:16)
- NAT, Cont. (01:08)
- Port Address Translation (01:50)
- IPv4 Link-Local Range (01:14)
- Remote Access (01:24)
- Telephony (00:59)
- Telephony, Cont. (00:44)
- Network Access Control (01:17)
- Virtualization (01:23)
- Virtualization, Cont. (02:21)
- Cloud Computing (00:23)
- Essential Characteristics (02:12)
- Service Model: SaaS (01:10)
- Service Model: PaaS (01:00)
- Service Model: IaaS (01:01)
- Deployment Models (01:25)
- Layered Security (01:11)
- Summary (00:17)