Infrastructure Security
Offered By: Cybrary
Course Description
Overview
Prerequisites
Fundamental knowledge of networks and network security is required. Students should be familiar with basic network architecture concepts (LAN/WAN, VLAN, perimeter vs internal, etc.). Students should also have at least a basic understanding of security device functions (firewalls, IPS, IDS, proxy, etc.).
Who is this Course For?
Network, Systems, and Security Engineers, Architects, and Managers
Course Goals
By the end of this course, students should be able to:
- Identify common infrastructure vulnerabilities and mitigation techniques.
- Describe the layers of infrastructure security and components at each layer.
- Articulate the application of common security models across the enterprise.
Syllabus
- The Threat Landscape
- Introduction
- Technology Vulnerabilities Part 1
- Technology Vulnerabilities Part 2
- Process Vulnerabilities
- People Vulnerabilities
- Attacker Motivations
- MITRE
- Malware Types
- Malware Identification
- Defense in Depth
- Layers of Defense
- Firewalls
- DMZ
- IPS/IDS
- Honeypots
- Remote Access Part 1
- Remote Access Part 2
- Encryption Part 1
- Encryption Part 2
- Web Proxies Part 1
- Web Proxies Part 2
- Network Access Control Part 1
- Network Access Control Part 2
- Wireless
- Anti-Virus
- Patch Management
- Config Management
- Web Application Firewalls
- DevSecOps
- Data Classification
- Data Loss Prevention
- Identity Access Management
- DAR Encryption
- File Integrity Monitoring
- Data Disposal
- Monitoring
- Policy
- Risk-Based Approach
- Module 2 Quiz
- Security Models
- Security Models
Taught by
Scott Russ
Related Courses
An Introduction to Computer NetworksStanford University via Independent Computer Networks
University of Washington via Coursera Computer Networking
Georgia Institute of Technology via Udacity Cybersecurity and Its Ten Domains
University System of Georgia via Coursera Model Building and Validation
AT&T via Udacity