Security Best Practices: Network Appliance Security


Overview/Description
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description

This course explores the best practices for securing network appliances, and the top network security risks in 14 videos examining best practices for IoT (Internet of things) security risks. You will learn the best practices for transitioning to the Cloud, and the three basic service models IaaS (infrastructure as a service), PaaS (platform as a service), and SaaS (software as a service). Learners will then examine the network perimeter, and security issues and strategies when moving to the Cloud, including how to address de-perimeterization and perimeter exploitation. You will learn about several security architecture models, including Zero Trust Architecture, intrusion kill chain, and the diamond model for intrusion analysis. You will examine the impact of software defined networking, and micro-segmentation to the network security. Learn about next-generation firewalls, network intrusion detection and prevention systems, and distributed denial of service attacks. Finally, you will learn the best practices of Zero Trust Architecture, and how to incorporate them.



Expected Duration (hours)
1.5

Lesson Objectives

Security Best Practices: Network Appliance Security

  • discover the key concepts covered in this course
  • recognize the importance of securing network appliances and the top network security risks
  • recognize best security practices for the Internet of Things
  • describe the security risks and best practices for transitioning to the cloud
  • recognize traditional infrastructure deficiencies, such as perimeter exploitation and de-perimeterization as a result of moving to the cloud
  • recognize concerns of moving to the security first mindset and de-perimeterization problems
  • describe Collaboration-oriented Architecture and how it can be used to deal with de-perimeterization
  • recognize various security architecture models such as the Zero Trust Model, the intrusion kill chain, and the diamond model of intrusion analysis
  • recognize the impact of software defined networking, virtual networking, and micro-segmentation to network security
  • recognize the best security places for network devices such as Next Generation Firewalls, Network Intrusion Detection and Prevention Systems, and Distributed Denial of Service Attacks
  • describe the Zero Trust Architecture and how to apply to the Zero Trust Model
  • recognize Zero Trust challenges, problems, and concerns
  • recognize and employ best practices for using the Zero Trust Architecture
  • summarize the key concepts covered in this course
  • Course Number:
    it_soscnadj_01_enus

    Expertise Level
    Intermediate