Network Defense and Countermeasures 2e

Wishlist Share
Share Course
Page Link
Share On Social Media

About Course

Network Defense (ND) and Countermeasures 2e focus on understanding the architecture for ND and helps prepare students for the Security Certified Network Professional Certification examination.

Topics include network attacks and defenses, firewall systems, design and configuration, virtual private network (VPN) configuration, designing and configuring intrusion detection systems, intrusion signatures, and network security policies and configurations.

>>

What Will You Learn?

  • -Identify the basic components of a layered structure for network defense -architecture; describe access control objectives and auditing concepts.
  • -Identify key concepts and technologies used in the design and implementation of firewall systems.
  • -Implement and configure firewalls for three different operating systems: DOS, Windows, and Linux.
  • -Describe virtual private networks (VPN) and security issues related to it.
  • -Describe the key concepts of intrusion detection systems. Distinguish between host-based and network-based intrusion detection systems.
  • -Implement and configure a network-based and host-based intrusion detection system (IDS).
  • -Describe core concepts of transmission control protocol/internet protocol (TCP/IP) packet and signature analysis with the goal of Intrusion detection.
  • -Describe the concepts and issues related to risk analysis.
  • -Configure and implement security policies for an organization.

Course Content

Network Defense and Countermeasures 2e

  • The risk of cyber terrorism
    00:00
  • Webcast: Data Protection and Disaster Recovery for Both Physical and Virtual Machines in one
    00:00
  • Disaster Recovery Planning-2
    00:00
  • Disaster Recovery Planning
    00:00
  • Information Security – Policy, Standard and Practice
    00:00
  • Standards, Compliance and Security
    00:00
  • IT Security Risk Assessment – Part 1 (clip 6/6)
    00:00
  • IT Security Risk Assessment – Part 1 (clip 5/6)
    00:00
  • IT Security Risk Assessment – Part 1 (clip 4/6)
    00:00
  • IT Security Risk Assessment – Part 1 (clip 3/6)
    00:00
  • IT Security Risk Assessment – Part 1 (clip 2/6)
    00:00
  • Key Issues in Selecting an Email Disaster Recovery and Business Continuity Solution
    00:00
  • 10 Hacking Tactics You Should Know Of
    00:00
  • Cybercrime Awareness Video
    00:00
  • Cybercrime
    00:00
  • Cyber Terrorism
    00:00
  • 25 Biggest Cyber Attacks In History
    00:00
  • What is cyberterrorism?
    00:00
  • Cyber Forensics
    00:00
  • 1.Computer Forensics an introduction
    00:00
  • Introduction to computer forensics
    00:00
  • Forensic Sciences
    00:00
  • The Real Science of Forensics
    00:00
  • Practical Risk Assessment and Mitigation
    00:00
  • Introduction to Risk Assessment
    00:00
  • Encryption Part I: Introduction to Encryption 3
    00:00
  • Encryption Part I: Introduction to Encryption 2
    00:00
  • Encryption Part I: Introduction to Encryption 1
    00:00
  • Basics of encryption
    00:00
  • Introduction to Intrusion Detection
    00:00
  • How does Intrusion Prevention Systems work?
    00:00
  • Intrusion Detection and Prevention Systems (IDS/IPS)
    00:00
  • Firewalls and Network Security
    00:00
  • What is firewall?
    00:00
  • Introduction to Cyber Security Part 2
    00:00
  • Encryption Part I: Introduction to Encryption 4
    00:00
  • VPN – Virtual Private Networking
    00:00
  • 03 – Security Fundamentals – Understanding Security Policies
    00:00
  • Security Policy Training and Procedures – CompTIA Security+ SY0-401: 2.6
    00:00
  • Difference Between Viruses, Worms, Malware, Trojans, Ransomware, and Spyware
    00:00
  • How to protect your computer from malware
    00:00
  • Best Ways to Protect Against Computer Viruses
    00:00
  • How to harden your Windows operating system
    00:00
  • Intro to Windows Hardening
    00:00
  • Hardening Windows processes
    00:00
  • What is a VPN? Lets talk about VPNs and why you should have one
    00:00
  • VPNs or Virtual Private Networks as Fast As Possible
    00:00
  • Introduction to Cyber Security Part 1
    00:00

Student Ratings & Reviews

No Review Yet
No Review Yet