One way to prevent vulnerability exploits is to identify the issues before the hackers can find them. In this video, you’ll learn how vulnerability scanning can be used to build a more secure network infrastructure.
CompTIA Network+ N10-005
If you need to identify and stop network, operating system, and application vulnerabilities, then you’ll probably want to consider an IDS or IPS. In this video, you’ll learn about intrusion identification technologies and how they are used to prevent the exploit of vulnerabilities.
The translation of IP addresses can provide us with some useful network configurations. In this video, we’ll examine both network address translation and port address translation techniques and how they are commonly used.
A firewall uses a specific set of rules to allow or deny traffic flows through the network. In this video, you’ll learn about firewall rulebases and we’ll examine a firewall rulebase for an Internet-facing web server.
Today’s security technologies use different techniques for allowing traffic flows through the network. In this video, you’ll learn about firewall-based stateful inspection and how to perform simple packet filtering in other network devices.
Our firewalls allow us to keep the bad guys away from our systems but still provide for connectivity to network resources. In this video, you’ll learn about the advantages and disadvantages of hardware-based firewalls and software-based firewalls.
If a security event occurs in your organization, how would you handle it? In this video, you’ll learn some of the techniques used when dealing with a security incident.
Security policies are standard requirements for most organizations. In this video, you’ll learn about the best practices for security policies and ways to keep your user community updated with the latest information about security policies and procedures.
An important security practice is keeping your system and applications up-to-date. In this video, you’ll learn about patch management techniques and protecting your computer with timely updates.
With the right training, your end-users can be a valuable security measure. In this video, you’ll learn some techniques for training your end-users and making them aware of today’s modern security concerns.