Security Topologies: Developing Secure Networks


Overview/Description
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description

Learners can explore secure network challenges and security measures used to configure common tools, in this 14-video course. Familiarize yourself with approaches to configuration with a security mindset and review common security threats and their mitigations. Begin by taking a look at the challenges of a secure-first network design, then describe a network design approach from a security mindset. Examine the challenges to DevOps and Agile mindsets in terms of security decisions, and the network security concerns for hybrid cloud models. Learn how to configure an NGINX HTTP service to prevent insecure file access and configure web application security settings in NGINX. View the dangers of file upload remote execution; use Secure Shell (SSH) as a secure proxy for web browsing from an insecure location, and configure a SSH client to use present server connection settings. Discover how to use local/etc/hosts to block unwanted connections; examine the threat of user account discovery and how it is carried out, and finally, learn how to use password security tools to enforce a strong password policy.



Expected Duration (hours)
1.0

Lesson Objectives

Security Topologies: Developing Secure Networks

  • discover the key concepts covered in this course
  • describe the challenges of a secure-first network design
  • describe a network design approach from a security mindset
  • describe the challenges to DevOps and Agile mindsets in terms of security decisions
  • describe the network security concerns for hybrid cloud models
  • configure an NGINX HTTP service to prevent insecure file access
  • configure web application security settings in NGINX
  • describe the dangers of file upload remote execution
  • use SSH as a secure proxy for web browsing from an insecure location
  • configure an SSH client to use preset server connection settings
  • use the local /etc/hosts to block unwanted connections
  • describe the threat of user account discovery and how it is carried out
  • use password security tools to enforce a strong password policy
  • summarize the key concepts covered in this course
  • Course Number:
    it_sadstodj_01_enus

    Expertise Level
    Intermediate