Information Security: Subnetting & DNS for Security Architects


Overview/Description
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description

In this 11-video course, learners will discover key concepts related to subnetting, virtual machines (VMs), container, and DNS (domain name system) security. Examine tips and tricks used in subnetting and subnetting advantages. Explore classless inter-domain routing (CIDR), notation, deployment and security considerations for VMs and containers, and types of DNS attacks and mitigation strategies. You will begin the course by taking a look at the importance of subnetting, how it relates to security, and its advantages and disadvantages. Then move on to defining the CIDR notation. You will examine the subnetting cheat sheet, and learn various subnetting tips and tricks; compare VMs and containers, and examine the deployment considerations for VMs and containers. Next, learners will observe the best practices for deploying VMs, and the best practices for VM and container security. In the final two tutorials of this course, you will discover the various types of DNS attacks and their mitigations, and the various types of subnetting attacks and mitigations.



Expected Duration (hours)
1.1

Lesson Objectives

Information Security: Subnetting & DNS for Security Architects

  • introduce the key concepts of the course
  • describe subnetting and its advantages
  • define the CIDR notation
  • recognize subnetting tips and tricks
  • compare VMs and containers
  • describe the deployment considerations for virtual machines and containers
  • recognize best practices for deploying virtual machines
  • recognize best practices for VM and container security
  • describe the various types of DNS attacks and their mitigations
  • recognize the various types of subnetting attacks and mitigations
  • summarize the key concepts covered in this course
  • Course Number:
    it_saseandj_03_enus

    Expertise Level
    Beginner