وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

IT Security Foundations: Network Security

سرفصل های دوره

Want to keep your interconnected systems and data safe? In this course, Lisa Bock covers network security and securing an organization's infrastructure. Lisa introduces security devices such as firewalls and honeypots. In addition, she reviews the importance of isolating networks with VLANS and NAT addressing, along with a review of common security protocols. She also provides overviews of how to protect clients with antivirus software, encrypt folders and files, implement software restriction policies, and secure your cloud services. Finally, she looks at the often-overlooked topic of physical security, which includes securing a building's perimeter and the hardware within.


01 - Introduction
  • 01 - Securing the network
  • 02 - Discovering resources

  • 02 - 1. Recognize Security Devices
  • 01 - Understanding firewalls
  • 02 - Comparing advanced networking devices
  • 03 - Luring with honeypots
  • 04 - Examining honeypot findings
  • 05 - Challenge Exploring honeypot data
  • 06 - Solution Exploring honeypot data

  • 03 - 2. Isolate the Network
  • 01 - Segmenting using routers and VLANS
  • 02 - Configuring VLANS
  • 03 - Creating server and domain isolation
  • 04 - Recognizing perimeter networks
  • 05 - Translating the network address
  • 06 - Configuring NAT

  • 04 - 3. Secure the Cloud
  • 01 - Summarize cloud concepts
  • 02 - Connecting to the cloud
  • 03 - Outlining virtualized technology
  • 04 - Safeguarding cloud services

  • 05 - 4. Identify Attacks
  • 01 - Comparing attack methods
  • 02 - Attacking passwords
  • 03 - Sniffing the network
  • 04 - Spoofing protocols
  • 05 - Poisoning the ARP cache

  • 06 - 5. Secure Protocols and Procedures
  • 01 - Using antivirus
  • 02 - Safeguarding DNS
  • 03 - Securing internet protocol
  • 04 - Protecting DHCP
  • 05 - Encrypting data in transit (VPN)
  • 06 - Assessing security baselines

  • 07 - 6. Limiting Access
  • 01 - Using the principle of least privilege
  • 02 - Controlling access
  • 03 - Restricting network access
  • 04 - Protecting buildings
  • 05 - Securing hardware
  • 06 - Challenge Physical security requirements
  • 07 - Solution Physical security requirements

  • 08 - Conclusion
  • 01 - Summary
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 625
    حجم: 409 مگابایت
    مدت زمان: 137 دقیقه
    تاریخ انتشار: 25 دی 1401
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید