We rely on access lists to allow or deny traffic flows through our networks. In this video, you’ll learn about content filters, URL filters, and firewall rules.
The traffic we send across the network is subject to viewing by anyone along the way. In this video, you’ll learn about which protocols and services should be used to ensure a secure communications channel.
The default configuration of your operating system includes a number of services that you probably don’t use. In this video, you’ll learn how disabling unneeded network services and user accounts can help secure your computer.
Organizations use a formal set of policies to help guide their security requirements. In this video, you’ll learn about security policies and how they are used to develop a formal security posture.
Our network switches often include many different security features. In this video, you’ll learn about DHCP snooping, dynamic ARP inspection, MAC limiting and filtering, and VLAN segmentation.
We use many different technologies to keep the malware from embedding itself in our computers. In this video, you’ll learn about host-based, cloud-based, and network-based anti-malware.
In which of these cases would you be most likely to use a loopback plug?