Companies Home Search Profile

IT Security Foundations: Network Security

Focused View

Lisa Bock

2:16:47

117 View
  • 01 - Securing the network.mp4
    00:58
  • 02 - Discovering resources.mp4
    01:05
  • 01 - Understanding firewalls.mp4
    04:40
  • 02 - Comparing advanced networking devices.mp4
    04:40
  • 03 - Luring with honeypots.mp4
    03:30
  • 04 - Examining honeypot findings.mp4
    06:17
  • 05 - Challenge Exploring honeypot data.mp4
    02:02
  • 06 - Solution Exploring honeypot data.mp4
    05:07
  • 01 - Segmenting using routers and VLANS.mp4
    03:35
  • 02 - Configuring VLANS.mp4
    03:58
  • 03 - Creating server and domain isolation.mp4
    05:20
  • 04 - Recognizing perimeter networks.mp4
    03:25
  • 05 - Translating the network address.mp4
    03:54
  • 06 - Configuring NAT.mp4
    02:44
  • 01 - Summarize cloud concepts.mp4
    03:12
  • 02 - Connecting to the cloud.mp4
    03:14
  • 03 - Outlining virtualized technology.mp4
    03:51
  • 04 - Safeguarding cloud services.mp4
    03:53
  • 01 - Comparing attack methods.mp4
    05:38
  • 02 - Attacking passwords.mp4
    04:38
  • 03 - Sniffing the network.mp4
    04:07
  • 04 - Spoofing protocols.mp4
    03:47
  • 05 - Poisoning the ARP cache.mp4
    03:57
  • 01 - Using antivirus.mp4
    03:45
  • 02 - Safeguarding DNS.mp4
    03:55
  • 03 - Securing internet protocol.mp4
    05:05
  • 04 - Protecting DHCP.mp4
    04:20
  • 05 - Encrypting data in transit (VPN).mp4
    05:24
  • 06 - Assessing security baselines.mp4
    03:45
  • 01 - Using the principle of least privilege.mp4
    03:47
  • 02 - Controlling access.mp4
    03:10
  • 03 - Restricting network access.mp4
    03:30
  • 04 - Protecting buildings.mp4
    05:16
  • 05 - Securing hardware.mp4
    02:56
  • 06 - Challenge Physical security requirements.mp4
    01:39
  • 07 - Solution Physical security requirements.mp4
    01:26
  • 01 - Summary.mp4
    01:17
  • Description


    Want to keep your interconnected systems and data safe? In this course, Lisa Bock covers network security and securing an organization's infrastructure. Lisa introduces security devices such as firewalls and honeypots. In addition, she reviews the importance of isolating networks with VLANS and NAT addressing, along with a review of common security protocols. She also provides overviews of how to protect clients with antivirus software, encrypt folders and files, implement software restriction policies, and secure your cloud services. Finally, she looks at the often-overlooked topic of physical security, which includes securing a building's perimeter and the hardware within.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Experienced author with a demonstrated history of working in the e-learning industry. She is a security ambassador with a broad range of IT skills and knowledge, including networking, CyberOps, Wireshark, biometrics, Ethical Hacking and the IoT. Lisa is an author for LinkedIn Learning, Packt Publishing and CompTIA and is an award-winning speaker who has presented at several national conferences. She holds a MS in computer information systems/information assurance from UMGC. Lisa was an associate professor in the IT department at Pennsylvania College of Technology (Williamsport, PA) from 2003 until her retirement in 2020. She is involved with various volunteer activities, and she and her husband Mike enjoy bike riding, watching movies, and traveling.
    LinkedIn Learning is an American online learning provider. It provides video courses taught by industry experts in software, creative, and business skills. It is a subsidiary of LinkedIn. All the courses on LinkedIn fall into four categories: Business, Creative, Technology and Certifications. It was founded in 1995 by Lynda Weinman as Lynda.com before being acquired by LinkedIn in 2015. Microsoft acquired LinkedIn in December 2016.
    • language english
    • Training sessions 37
    • duration 2:16:47
    • Release Date 2022/11/26