The security of the network is a never-ending struggle against the bad guys. In this video, you’ll learn about the most common security threats and what you can do to protect your network resources. We’ll discuss denial of service attacks, viruses, worms, man in the middle attacks, rogue access points, social engineering, and phishing. We’ll also show you how policies and procedures, user training, and patching can help mitigate these security problems in your network.
CompTIA Network+ N10-004
The security of the devices on our network must be managed through both physical and technological means. In this video, you’ll learn the importance of good physical security, methods to restrict local and remote access to our devices, and the applications and protocols that you can use to build a more secure networking environment.
During a normal day, we are constantly authenticating our user credentials to web sites, file servers, and other network resources. As with most technologies, there’s more than one way to perform these authentications. In this video, you’ll learn what’s happening over the wire and become familiar with PKI, Kerberos, AAA, network access control technologies, CHAP, EAP, and much more.
The network is a wide-open space, but there are a number of technologies that network and security professionals can use to help control access to critical parts of the network. In this modules, you’ll learn about filtering technologies, tunneling and encryption methods, and remote access applications and protocols.
Firewalls are one of the most fundamental security components in our modern networks, but not all firewalls are created equally. In this module, you’ll learn about common features of modern firewalls, such as network-layer and application-layer firewalls, stateful vs. stateless operation, content filtering, signature identification, and zone-based security.
As network professionals, we rely on some core security devices to protect our network. In this video, you’ll learn about network-based firewalls, host-based firewalls, IDS/IPS, and VPN concentrators.
If you’re managing a network, you’ll need a comprehensive toolkit to keep things running at peak efficiency. In this video, you’ll learn about the tools that will make your life a much better place. We’ll discuss cable testers and certifiers, TDRs, multimeters, punch-down tools, voltage event recorders, and much more.
The network is a constantly moving river of information, and it may be necessary to occasionally test the water as it flows by. In this video module, you’ll learn the reasons for scanning your network and the different technologies available to gather information. We’ll also dive into packet analyzers, intrusion detection systems, intrusion prevention systems, and port scanners.
Many of the most powerful network troubleshooting tools can be found at the command line of your operating system. In this video, you’ll learn the importance of command line tools such as traceroute, ipconfig, ifconfig, ping, arping, nslookup, dig, mtr, route, nbtstat, and netstat.
The lack of a physical infrastructure can make troubleshooting a wireless network a bit more complex than traditional wired networks. In this video, you’ll learn how to troubleshoot some of the most common wireless network issues, such as interference, encryption mismatches, frequency problems, bounce, and antenna placement.