Network Security Fundamentals

Network Security Fundamentals

English | MP4 | AVC 1280×720 | AAC 44KHz 2ch | 2h 16m | 285 MB

Data network security is more important than ever. This course will examine critical network attacks as well as tools, techniques, and policies that can help mitigate network attacks and data breaches.

Data breaches have become common place in national and world news, and because of this, engineers now find themselves in new roles in organizations, exclusively focused on securing information. In this course, Network Security Fundamentals, you will learn about the different types of attacks used to bring down networks, and/or steal data from them. First, you will examine the physical security of data centers, password creation recommendations, user account privileges, and devices to monitor network behavior. Next, you will learn about techniques for mitigating these attacks. Finally, you will learn about mechanisms for encrypting wireless traffic. By the end of this course, you will know the difference between WEP, WPA, WPA2, and how you can use multifactor authentication to prevent unauthorized account access.

Table of Contents

Course Overview
1 Course Overview

Physical Security Devices
2 Introduction and Module Goals
3 Video Surveillance
4 Asset Tracking
5 Facility Access
6 Summary

Authentication and Access Controls
7 Introduction and Module Goals
8 AAA and AAA Server Options
9 Authentication
10 Logging and Auditing
11 Multifactor Authentication
12 Access Control
13 Demo – Examine Port Security
14 Summary

Wireless Network Security
15 Introduction and Module Goals
16 Wireless Network Encryption
17 Wireless Encryption Authentication and Authorization
18 Demo – Examine Wireless Access Point Security Options
19 Geofencing
20 Summary

Network Attack Vectors
21 Introduction and Module Goals
22 Vulnerabilities and Exploits
23 Human Exploits
24 Social Engineering
25 Denial of Service DOS Attacks
26 Wifi Attacks
27 Rogue AP Attacks
28 Man-in-the-middle Attack
29 Password Attacks
30 Summary

Network Device Hardening
31 Introduction and Module Goals
32 Configuration Changes
33 Demo – Generating Crypto Keys
34 Software Updates
35 Demo – File Hash Verification
36 Disabling Unused Service
37 Summary

Network Attack Prevention
38 Introduction and Module Goals
39 Internet Edge
40 Device Hardening
41 Users and Data
42 Auditing
43 Summary