Network Defense and Countermeasures 2e

Wishlist Share
Share Course
Page Link
Share On Social Media

About Course

Network Defense (ND) and Countermeasures 2e focus on understanding the architecture for ND and helps prepare students for the Security Certified Network Professional Certification examination.

Topics include network attacks and defenses, firewall systems, design and configuration, virtual private network (VPN) configuration, designing and configuring intrusion detection systems, intrusion signatures, and network security policies and configurations.

>>

What Will You Learn?

  • -Identify the basic components of a layered structure for network defense -architecture; describe access control objectives and auditing concepts.
  • -Identify key concepts and technologies used in the design and implementation of firewall systems.
  • -Implement and configure firewalls for three different operating systems: DOS, Windows, and Linux.
  • -Describe virtual private networks (VPN) and security issues related to it.
  • -Describe the key concepts of intrusion detection systems. Distinguish between host-based and network-based intrusion detection systems.
  • -Implement and configure a network-based and host-based intrusion detection system (IDS).
  • -Describe core concepts of transmission control protocol/internet protocol (TCP/IP) packet and signature analysis with the goal of Intrusion detection.
  • -Describe the concepts and issues related to risk analysis.
  • -Configure and implement security policies for an organization.

Course Content

Network Defense and Countermeasures 2e

  • Introduction to Cyber Security Part 1
    00:00
  • Introduction to Cyber Security Part 2
    00:00
  • What is firewall?
    00:00
  • Firewalls and Network Security
    00:00
  • Intrusion Detection and Prevention Systems (IDS/IPS)
    00:00
  • How does Intrusion Prevention Systems work?
    00:00
  • Introduction to Intrusion Detection
    00:00
  • Basics of encryption
    00:00
  • Encryption Part I: Introduction to Encryption 1
    00:00
  • Encryption Part I: Introduction to Encryption 2
    00:00
  • Encryption Part I: Introduction to Encryption 3
    00:00
  • Encryption Part I: Introduction to Encryption 4
    00:00
  • VPN – Virtual Private Networking
    00:00
  • VPNs or Virtual Private Networks as Fast As Possible
    00:00
  • What is a VPN? Lets talk about VPNs and why you should have one
    00:00
  • Hardening Windows processes
    00:00
  • Intro to Windows Hardening
    00:00
  • How to harden your Windows operating system
    00:00
  • Best Ways to Protect Against Computer Viruses
    00:00
  • How to protect your computer from malware
    00:00
  • Difference Between Viruses, Worms, Malware, Trojans, Ransomware, and Spyware
    00:00
  • Security Policy Training and Procedures – CompTIA Security+ SY0-401: 2.6
    00:00
  • 03 – Security Fundamentals – Understanding Security Policies
    00:00
  • Introduction to Risk Assessment
    00:00
  • Practical Risk Assessment and Mitigation
    00:00
  • IT Security Risk Assessment – Part 1 (clip 2/6)
    00:00
  • IT Security Risk Assessment – Part 1 (clip 3/6)
    00:00
  • IT Security Risk Assessment – Part 1 (clip 4/6)
    00:00
  • IT Security Risk Assessment – Part 1 (clip 5/6)
    00:00
  • IT Security Risk Assessment – Part 1 (clip 6/6)
    00:00
  • Standards, Compliance and Security
    00:00
  • Information Security – Policy, Standard and Practice
    00:00
  • Disaster Recovery Planning
    00:00
  • Disaster Recovery Planning-2
    00:00
  • Webcast: Data Protection and Disaster Recovery for Both Physical and Virtual Machines in one
    00:00
  • Key Issues in Selecting an Email Disaster Recovery and Business Continuity Solution
    00:00
  • 10 Hacking Tactics You Should Know Of
    00:00
  • The Real Science of Forensics
    00:00
  • Forensic Sciences
    00:00
  • Introduction to computer forensics
    00:00
  • 1.Computer Forensics an introduction
    00:00
  • Cyber Forensics
    00:00
  • What is cyberterrorism?
    00:00
  • 25 Biggest Cyber Attacks In History
    00:00
  • Cyber Terrorism
    00:00
  • Cybercrime
    00:00
  • Cybercrime Awareness Video
    00:00
  • The risk of cyber terrorism
    00:00

Student Ratings & Reviews

No Review Yet
No Review Yet