This product is no longer in stock
Information from: Fundamentals of cybersecurity: Networks
Learn how they work and how you can protect computer networks, incident detection and protection technologies. The communication channels that link our systems, servers, terminals and communicate or isolate us from the internet. Learn about network architecture, secure and insecure protocols, their threats and risks, network configuration and terminal security as just another element of the network. Also, obtain knowledge about the physical security of our infrastructures, through which our information travels and which are the first line of defense before our connected equipment.
Telematic networks are the basis of all organization's communications, the gateway for the legitimate and illegitimate. To avoid unauthorized penetration or exfiltration of data, we must have certain network security resources such as those discussed below.
Filtering traffic with firewalls 05:08
What are IDS and IPS systems? 04:13
The SCM and UTM systems 04:58
NAP and WSUS 06:49
Isolation of networks to improve security
One of the measures we can take in any environment where we want to improve security is compartmentalization. The isolation of networks and equipment so that they only maintain the communications for which they have been implemented, closes windows of opportunity to possible incidents or attacks.
Approach to VLAN networks 05:18
Isolation of servers and domains 05:19
Lures with Honeypots 04:42
Perimeter Networks or DMZs 02:56
IPv4 protocol and NAT segmentation 06:33
Security for protocols
Many communication protocols, or those that support it, were created decades ago without considering possible normal security situations today. That is why additional protocols or frameworks have been designed to help improve the security of the original protocols.
Spoofing of protocols 07:56
DNS Protocols and DNSSEC 06:44
Sniffing or capturing network traffic 04:14
Attack methods at network level 05:52
Password attacks 06:19
The IPsec framework for IP 04:38
Protection of the client
All telematic technology has as its ultimate goal the work of people and their communication, which starts and ends at the terminals of these users. Being the extreme nodes of communication, they must be as protected as any other link in the chain.
Protection by antivirus 07:25
Discovering the UAC 05:12
Offline encryption and AppLocker 04:23
Work with physical security
All the information that our infrastructure stores and manages has a physical support, and the protection of those items in the analog world is as important as the information they contain.
Physical protection of buildings and hardware 04:00
Why observational PC is important 03:05
Physical and logical access controls 03:45
Security on mobile devices 03:04
Size: 199 MB
Content: 22 Videos
Duration: 1:52 hours
Base Files: DOES NOT contain
Totally free of viruses and malicious software, so do not wait any longer to download it now.
Do not forget to give us an opinion about the course, to improve the content.
NOTE: Do not forget to follow us on our facebook and twitter social networks so that you become part of our community and receive the notification every time we post something new, so you will not miss anything.
|File Size||436 MB|
NO registration required!
If the question you have has not yet been answered here, use the form below to ask something about this addon.