Course Fundamentals of cybersecurity Networks

CURS-355

Learn about network architecture, secure and insecure protocols, their threats and risks, network configuration and terminal security as just another element of the network. Also, obtain knowledge about the physical security of our infrastructures, through which our information travels and which are the first line of defense before our connected equipment.

Course Fundamentals of cybersecurity Networks


Information from: Fundamentals of cybersecurity: Networks
Learn how they work and how you can protect computer networks, incident detection and protection technologies. The communication channels that link our systems, servers, terminals and communicate or isolate us from the internet. Learn about network architecture, secure and insecure protocols, their threats and risks, network configuration and terminal security as just another element of the network. Also, obtain knowledge about the physical security of our infrastructures, through which our information travels and which are the first line of defense before our connected equipment.

Security devices
Telematic networks are the basis of all organization's communications, the gateway for the legitimate and illegitimate. To avoid unauthorized penetration or exfiltration of data, we must have certain network security resources such as those discussed below.

Filtering traffic with firewalls 05:08
What are IDS and IPS systems? 04:13
The SCM and UTM systems 04:58
NAP and WSUS 06:49


Isolation of networks to improve security
One of the measures we can take in any environment where we want to improve security is compartmentalization. The isolation of networks and equipment so that they only maintain the communications for which they have been implemented, closes windows of opportunity to possible incidents or attacks.

Approach to VLAN networks 05:18
Isolation of servers and domains 05:19
Lures with Honeypots 04:42
Perimeter Networks or DMZs 02:56
IPv4 protocol and NAT segmentation 06:33


Security for protocols
Many communication protocols, or those that support it, were created decades ago without considering possible normal security situations today. That is why additional protocols or frameworks have been designed to help improve the security of the original protocols.

Spoofing of protocols 07:56
DNS Protocols and DNSSEC 06:44
Sniffing or capturing network traffic 04:14
Attack methods at network level 05:52
Password attacks 06:19
The IPsec framework for IP 04:38

Advertising.

Protection of the client
All telematic technology has as its ultimate goal the work of people and their communication, which starts and ends at the terminals of these users. Being the extreme nodes of communication, they must be as protected as any other link in the chain.

Protection by antivirus 07:25
Discovering the UAC 05:12
Offline encryption and AppLocker 04:23


Work with physical security
All the information that our infrastructure stores and manages has a physical support, and the protection of those items in the analog world is as important as the information they contain.

Physical protection of buildings and hardware 04:00
Why observational PC is important 03:05
Physical and logical access controls 03:45
Security on mobile devices 03:04

Technical data:

Format: .MP4
Resolution: 1280x720p
Size: 199 MB
Spanish Language
Content: 22 Videos
Duration: 1:52 hours
Base Files: DOES NOT contain

Ver Capturas


Totally free of viruses and malicious software, so do not wait any longer to download it now.

Do not forget to give us an opinion about the course, to improve the content.

Advertising.

Download Course Fundamentals of cybersecurity Redes Gratis


Download Here Totally Free

Contraseña/Password: www.intarcesoft.com.ve


Follow us on our social networks


NOTE: Do not forget to follow us on our facebook and twitter social networks so that you become part of our community and receive the notification every time we post something new, so you will not miss anything.

Grade 
12/08/2017

Excelente

Gran curso

    Write your review!

    Write a review

    Course Fundamentals of cybersecurity Networks

    Course Fundamentals of cybersecurity Networks

    Learn about network architecture, secure and insecure protocols, their threats and risks, network configuration and terminal security as just another element of the network. Also, obtain knowledge about the physical security of our infrastructures, through which our information travels and which are the first line of defense before our connected equipment.

    Ask a question

    NO registration required!

    If the question you have has not yet been answered here, use the form below to ask something about this addon.

    (optional)
    *(Required to be notified when an answer is available)

    If the download link redirects to another product that is not described in the article or is broken, report it using our Reporting Form