Vi ste ovdje
Overview/Description
Network security professionals must have a firm understanding of the transport mechanisms and attacks faced by traffic entering and exiting a network environment. This course examines the TCP/IP protocol suite, the OSI model, and the different protocols that operate within the layers of these models. This course also examines various attacks that protocols and ports can face, along with the tools that can be used to detect these attacks. This course helps prepares the learner to write the CompTIA Security+ Certification SYO-301.
Target Audience
Individuals who have day to...
Overview/Description
Security professionals are increasingly being made responsible for securing remote and wireless environments. This course examines different remote access strategies and technologies such as PPP, VPNs, PPTP, L2TP, IPsec, RADIUS, and TACACS. This course also examines wireless security mechanisms such as WEP, WPA, CCMP, EAP, PEAP, LEAP, MAC filters, SSID broadcast, and antenna placement and the attacks they are designed to fend off. This course helps prepares the learner to write the CompTIA Security+ Certification SYO-301.
Target Audience
Individuals who have day to day...
Overview/Description
Web servers, web applications, virtualization, and cloud computing are becoming standard parts of corporate infrastructures. This course examines the communications standards and protocols that are used in the web server environment, along with the ways to harden web servers and web browsers. This course also examines the different types of attacks that web servers and web-based applications can face. Finally, this course looks at virtualized environments, along with cloud computing and the different types of services and challenges that each can offer. This course helps...
Overview/Description
Security professionals must be able to create secure networking environments using appropriate tools and techniques while also being able to test existing network environments for security weaknesses. This course examines the use of routers and switches to create a secure environment, while also looking at how techniques such as creating subnets, DMZs, and VLANs can be used to secure an environment. This course also examines security assessment techniques and how penetration testing, vulnerability scanning tools, and honeypots can be used to find holes in network security...
Overview/Description
Securing the networking environment is the most important job role that a Security specialist will perform. This course examines the methods, tools, and applications that can be used to secure the data, mobile devices, and operating systems, as well as how to deploy environmental controls and physical access controls. This course looks at locking mechanisms - application and physical - along with encryption schemes for data on servers and mobile devices. This course also examines the different environmental and physical controls that can be used to secure an IT...
Overview/Description
Without a well thought out plan in place, all the best equipment and well trained personnel in the world will be useless in the event of a disaster. Disasters can be manmade or natural, and both types can cause short delays or major business disruptions. This course covers backup strategies and archiving data, so that there are copies available in the case of a major breakdown of your information infrastructure. It also explains procedures for restoring data and discusses various types of backup, such as full, incremental, and differential along with the common media used...
Overview/Description
A well managed network relies on accurate documentation, well designed policies, and efficient procedures. Understanding how to create good documentation, policies, and procedures can help ensure that a network is well run and that it can withstand the occasional crisis. Implementing these concepts at the server level is an excellent place to begin. This course covers the documentation, policies, and procedures that are the most necessary to server architecture. It provides a description of what each one is and how to go about creating the various elements. Along with...
Overview/Description
Almost everywhere you go, from large businesses to people's homes, networks are in place to facilitate the movement of data between computers and other devices, such as printers or the Internet. In addition to that, the vast amounts of data generated in today's computing environments means that storage issues are something that every business and server administrator needs to deal with sooner or later. The hardware and software involved in networking and storage management can be complicated, which can make troubleshooting issues that arise complicated as well. It is...
Overview/Description
A network may have many servers on it, each playing a unique role. In order for a server to do its job properly, it must have the proper hardware and software installed. A server may be performing a network service, such as DNS or DHCP, serving applications such as e-mail, or providing network security as in the case of a firewall or authentication server. The administrator must be familiar with each of the potential roles and how they will impact each other and the users they serve. This course introduces the various server roles and discusses the possible benefits of...
Overview/Description
Because so much work is done electronically, businesses and governments generate vast amounts of information, most of which needs to be kept available and safe. Storage technologies have improved with the growth of data requirements. This course introduces the technologies involved in storing and protecting this data and the different types of storage media, such as optical media, and describes the increased reliance on hard disks for permanent, secure data storage. As well, it discusses the technology behind RAID arrays and the various types of storage architectures....