This course explores the best practices for securing network appliances, and the top network security risks in 14 videos examining best practices for IoT (Internet of things) security risks. You will learn the best practices for transitioning to the Cloud, and the three basic service models IaaS (infrastructure as a service), PaaS (platform as a service), and SaaS (software as a service). Learners will then examine the network perimeter, and security issues and strategies when moving to the Cloud, including how to address de-perimeterization and perimeter exploitation. You will learn about several security architecture models, including Zero Trust Architecture, intrusion kill chain, and the diamond model for intrusion analysis. You will examine the impact of software defined networking, and micro-segmentation to the network security. Learn about next-generation firewalls, network intrusion detection and prevention systems, and distributed denial of service attacks. Finally, you will learn the best practices of Zero Trust Architecture, and how to incorporate them.
Security Best Practices: Network Appliance Security
discover the key concepts covered in this course
recognize the importance of securing network appliances and the top network security risks
recognize best security practices for the Internet of Things
describe the security risks and best practices for transitioning to the cloud
recognize traditional infrastructure deficiencies, such as perimeter exploitation and de-perimeterization as a result of moving to the cloud
recognize concerns of moving to the security first mindset and de-perimeterization problems
describe Collaboration-oriented Architecture and how it can be used to deal with de-perimeterization
recognize various security architecture models such as the Zero Trust Model, the intrusion kill chain, and the diamond model of intrusion analysis
recognize the impact of software defined networking, virtual networking, and micro-segmentation to network security
recognize the best security places for network devices such as Next Generation Firewalls, Network Intrusion Detection and Prevention Systems, and Distributed Denial of Service Attacks
describe the Zero Trust Architecture and how to apply to the Zero Trust Model
recognize Zero Trust challenges, problems, and concerns
recognize and employ best practices for using the Zero Trust Architecture