Network security encompasses best practices and policies that are put in place to help monitor and prevent malicious attacks against both internal and external threats.
In this course, you'll learn about the confidentiality, integrity, and availability triad and other common security concepts. You’ll explore well-known threats, both internal and external, as well as common vulnerabilities and newly discovered software vulnerabilities. Next, you’ll examine authentication methods and how to perform security assessments.
You'll also examine common attacks, with a focus on technology-based attacks, and learn to differentiate between denial of service, distributed denial of service and Botnet/command and control attacks. You'll further explore how to prevent and remove ransomware and malware. Lastly, you'll learn about human and environmental attacks, such as social engineering, and how to differentiate between different social engineering attacks. This course is one of a collection of courses that prepares learners for the N10-008: CompTIA Network+ certification exam.
describe the confidentiality, integrity, and availability (CIA) triad and outline how it can guide policies for information security within an organization
recognize the most common potential internal and external threats to a network
describe common network vulnerabilities such as zero-day attacks
outline the characteristics of common exploits, including IP spoofing and eavesdropping
outline the principle of least privilege
recognize when and where to use role-based access control (RBAC)
describe the zero trust security model
outline the purpose and features of the defense in depth cybersecurity approach and how it can encompass separation of duties, network segmentation, network access control, and honeypots
differentiate between authentication methods including multifactor, Terminal Access Controller Access-Control System Plus (TACACS+), Single sign-on (SSO), Remote Authentication Dial-in User Service (RADIUS), LDAP, Kerberos, local authentication, 802.1X, and Extensible Authentication Protocol (EAP)
describe the benefits of security assessments and outline the most common assessment techniques including vulnerability assessments, penetration testing, risk assessments, and posture assessments
outline the purpose and characteristics of the security information and event management (SIEM) software
differentiate between common technology-based attacks including DNS poisoning, VLAN hopping, ARP spoofing, rogue DHCP, rogue access point (AP), evil twin, brute-force, dictionary, MAC spoofing, IP spoofing, and deauthentication
describe ransomware attacks and outline how to prevent and remove them
recognize best practices for preventing malware attacks
outline the purpose and characteristics of an on-path attack
describe commonly used password attack methods
outline the purpose and characteristics of denial of service (DoS), distributed denial of service (DDoS), and Botnet or command and control attacks
differentiate between common types of social engineering attacks including phishing, tailgating, piggybacking, and shoulder surfing