
About Course
Network Defense (ND) and Countermeasures 2e focus on understanding the architecture for ND and helps prepare students for the Security Certified Network Professional Certification examination.
Topics include network attacks and defenses, firewall systems, design and configuration, virtual private network (VPN) configuration, designing and configuring intrusion detection systems, intrusion signatures, and network security policies and configurations.
>>
Course Content
Network Defense and Countermeasures 2e
-
Introduction to Cyber Security Part 1
00:00 -
Introduction to Cyber Security Part 2
00:00 -
What is firewall?
00:00 -
Firewalls and Network Security
00:00 -
Intrusion Detection and Prevention Systems (IDS/IPS)
00:00 -
How does Intrusion Prevention Systems work?
00:00 -
Introduction to Intrusion Detection
00:00 -
Basics of encryption
00:00 -
Encryption Part I: Introduction to Encryption 1
00:00 -
Encryption Part I: Introduction to Encryption 2
00:00 -
Encryption Part I: Introduction to Encryption 3
00:00 -
Encryption Part I: Introduction to Encryption 4
00:00 -
VPN – Virtual Private Networking
00:00 -
VPNs or Virtual Private Networks as Fast As Possible
00:00 -
What is a VPN? Lets talk about VPNs and why you should have one
00:00 -
Hardening Windows processes
00:00 -
Intro to Windows Hardening
00:00 -
How to harden your Windows operating system
00:00 -
Best Ways to Protect Against Computer Viruses
00:00 -
How to protect your computer from malware
00:00 -
Difference Between Viruses, Worms, Malware, Trojans, Ransomware, and Spyware
00:00 -
Security Policy Training and Procedures – CompTIA Security+ SY0-401: 2.6
00:00 -
03 – Security Fundamentals – Understanding Security Policies
00:00 -
Introduction to Risk Assessment
00:00 -
Practical Risk Assessment and Mitigation
00:00 -
IT Security Risk Assessment – Part 1 (clip 2/6)
00:00 -
IT Security Risk Assessment – Part 1 (clip 3/6)
00:00 -
IT Security Risk Assessment – Part 1 (clip 4/6)
00:00 -
IT Security Risk Assessment – Part 1 (clip 5/6)
00:00 -
IT Security Risk Assessment – Part 1 (clip 6/6)
00:00 -
Standards, Compliance and Security
00:00 -
Information Security – Policy, Standard and Practice
00:00 -
Disaster Recovery Planning
00:00 -
Disaster Recovery Planning-2
00:00 -
Webcast: Data Protection and Disaster Recovery for Both Physical and Virtual Machines in one
00:00 -
Key Issues in Selecting an Email Disaster Recovery and Business Continuity Solution
00:00 -
10 Hacking Tactics You Should Know Of
00:00 -
The Real Science of Forensics
00:00 -
Forensic Sciences
00:00 -
Introduction to computer forensics
00:00 -
1.Computer Forensics an introduction
00:00 -
Cyber Forensics
00:00 -
What is cyberterrorism?
00:00 -
25 Biggest Cyber Attacks In History
00:00 -
Cyber Terrorism
00:00 -
Cybercrime
00:00 -
Cybercrime Awareness Video
00:00 -
The risk of cyber terrorism
00:00
Student Ratings & Reviews
No Review Yet