Imate žicu za učenje?

Overview/Description An important element in the overall security posture of an organization is the security of the network infrastructure. The network infrastructure refers to the routers, switches, and other such equipment that keep a network running. The infrastructure is often the target of denial of service (DoS) and other attacks that can directly or indirectly disrupt the network operation. In order to ensure the availability of the network, it is critical to implement the security tools and best practices that help protect each network element, and the infrastructure as a whole. This...
Overview/Description Network security threats have the potential to significantly impede productivity, disrupt business and operations, and result in loss of information, which can lead to financial losses and noncompliance. Hackers continue to develop new techniques to gain access to information for their own financial gain, and these techniques are harder than ever to detect. Businesses need comprehensive solutions that are highly manageable and operational to proactively address these threats. One of these solutions is the zone-based policy firewall which changes the original...
Overview/Description Intrusion detection system (IDS) and intrusion prevention system (IPS) solutions form an important part of a robust network defense solution. Maintaining secure network services is an essential requirement of a profitable IP-based business. This course defines intrusion prevention architectures, and introduces the underlying technologies and recommended practices for their deployment. Configuring the Cisco IOS Intrusion Prevention System (IPS) is a core competency for a network security administrator. This course describes how to configure Cisco IOS IPS on routers using...
Overview/Description The open nature of the Internet makes it increasingly important for growing businesses to pay attention to the security of their networks. As companies move more of their business functions to the public network, they need to take precautions to ensure that their data is not compromised or does not end up in front of the wrong people. It has become increasingly difficult to establish and maintain a secure network computing environment, and the challenge is made more difficult because of increased availability requirements and growing regulatory requirements. Risk...
Overview/Description The IP Security (IPsec) VPN is an essential tool for providing a secure network for business communication, and this course addresses the different protocols and algorithms that IPsec uses and the different security services that IPsec provides. The course also introduces different VPN technologies and examines the various Cisco products that are available and the best practices that you should use with them. Site-to-site VPNs are the option of choice for organizations of all kinds in implementing a corporate network across public and private networks. Internet-based VPN...
Overview/Description IP version 6 (IPv6) shares some of the same security concerns and considerations as IP version 4 (IPv4). However, some IPv6-specific vulnerabilities and threats will affect how you develop and implement a strategy to protect IPv6 infrastructures and services. This course explains the need for IPv6; describes the fundamental features of IPv6; and analyzes the IPv6 addressing scheme, components, design principles, and configuration. It then evaluates how common and specific threats affect IPv6. Finally, it recommends best practices to protecting IPv6 networks. Target...
Overview/Description Like routers, both Layer 2 and Layer 3 switches have their own set of network security requirements. Access to switches is a convenient entry point for attackers who are intent on illegally gaining access to a corporate network. With access to a switch, an attacker can set up rogue access points and protocol analyzers, and launch all types of attacks from within the network. Attackers can even spoof the MAC and IP addresses of critical servers and do significant damage. This course introduces basic switching concepts, explains security threats that exploit vulnerabilities...
Overview/Description Authentication, authorization, and accounting (AAA) solutions are widely supported in Cisco IOS Software as an additional security service available for securing access to network devices and networks. One of the options you have when configuring your network to work with AAA is to use a local username and password database to provide security greater than a simple password. It is likely that smaller organizations will configure AAA to operate locally. This course presents an introduction to implementing AAA. It describes how to securely implement the management and...
Overview/Description It is important to know that the security policy that is developed in your organization influences all of the steps that are taken to secure network resources. The development of a comprehensive security policy is covered in this course. In order to create an effective security policy, it is also necessary to perform a risk analysis in order to maximize the effectiveness of the policy. Also, it is essential to frame security policies within the context of a life-cycle approach. This course describes the different phases of the process, their dependencies, and the...
Overview/Description Current trends in security threat vectors require a carefully planned threat control strategy. Trends that affect security include persistent application-layer threats that use social engineering to exploit the trust architecture of the enterprise, the pervasiveness of mobility and consumerization, and the insidious motivations behind the behavior of the attacker. All these trends result in the need for dynamic security intelligence gathering and distribution, early warning systems, and application layer inspection for mobile services where data and applications are...

Koraci do učenja

1Prijavi se

Prijavite se, a ako nemate korisničko ime, registrirajte se.

2Pronađi i upiši program

Pronađite edukacijske programe u Katalogu i Certifikaciji, ili koristite polje za pretragu.

3Uči

Upisani programi dostupni su u meniju Korisnik, Moji tečajevi.

»Detaljne upute

Trebate pomoć?