Moocable is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Infrastructure Security

via Cybrary

Description

Prerequisites

Fundamental knowledge of networks and network security is required. Students should be familiar with basic network architecture concepts (LAN/WAN, VLAN, perimeter vs internal, etc.). Students should also have at least a basic understanding of security device functions (firewalls, IPS, IDS, proxy, etc.).

Who is this Course For?

Network, Systems, and Security Engineers, Architects, and Managers

Course Goals

By the end of this course, students should be able to:

  • Identify common infrastructure vulnerabilities and mitigation techniques.
  • Describe the layers of infrastructure security and components at each layer.
  • Articulate the application of common security models across the enterprise.

Tags

Syllabus

  • The Threat Landscape
    • Introduction
    • Technology Vulnerabilities Part 1
    • Technology Vulnerabilities Part 2
    • Process Vulnerabilities
    • People Vulnerabilities
    • Attacker Motivations
    • MITRE
    • Malware Types
    • Malware Identification
  • Defense in Depth
    • Layers of Defense
    • Firewalls
    • DMZ
    • IPS/IDS
    • Honeypots
    • Remote Access Part 1
    • Remote Access Part 2
    • Encryption Part 1
    • Encryption Part 2
    • Web Proxies Part 1
    • Web Proxies Part 2
    • Network Access Control Part 1
    • Network Access Control Part 2
    • Wireless
    • Anti-Virus
    • Patch Management
    • Config Management
    • Web Application Firewalls
    • DevSecOps
    • Data Classification
    • Data Loss Prevention
    • Identity Access Management
    • DAR Encryption
    • File Integrity Monitoring
    • Data Disposal
    • Monitoring
    • Policy
    • Risk-Based Approach
    • Module 2 Quiz
  • Security Models
    • Security Models

Online Course


Infrastructure Security

via Cybrary
Affiliate notice

Prerequisites

Fundamental knowledge of networks and network security is required. Students should be familiar with basic network architecture concepts (LAN/WAN, VLAN, perimeter vs internal, etc.). Students should also have at least a basic understanding of security device functions (firewalls, IPS, IDS, proxy, etc.).

Who is this Course For?

Network, Systems, and Security Engineers, Architects, and Managers

Course Goals

By the end of this course, students should be able to:

  • Identify common infrastructure vulnerabilities and mitigation techniques.
  • Describe the layers of infrastructure security and components at each layer.
  • Articulate the application of common security models across the enterprise.

  • The Threat Landscape
    • Introduction
    • Technology Vulnerabilities Part 1
    • Technology Vulnerabilities Part 2
    • Process Vulnerabilities
    • People Vulnerabilities
    • Attacker Motivations
    • MITRE
    • Malware Types
    • Malware Identification
  • Defense in Depth
    • Layers of Defense
    • Firewalls
    • DMZ
    • IPS/IDS
    • Honeypots
    • Remote Access Part 1
    • Remote Access Part 2
    • Encryption Part 1
    • Encryption Part 2
    • Web Proxies Part 1
    • Web Proxies Part 2
    • Network Access Control Part 1
    • Network Access Control Part 2
    • Wireless
    • Anti-Virus
    • Patch Management
    • Config Management
    • Web Application Firewalls
    • DevSecOps
    • Data Classification
    • Data Loss Prevention
    • Identity Access Management
    • DAR Encryption
    • File Integrity Monitoring
    • Data Disposal
    • Monitoring
    • Policy
    • Risk-Based Approach
    • Module 2 Quiz
  • Security Models
    • Security Models