PLU | Secure Network Design (2018 EN)

Discussion in 'Information Technology' started by Kanka, Jul 21, 2019.

  1. Kanka

    Kanka Well-Known Member Loyal User

    Messages:
    16,047
    Likes Received:
    449
    Trophy Points:
    83
    [​IMG]

    Company: Pluralsight
    Author: Kevin Henry
    Full Title: Secure Network Design
    Year: 2018
    Language: English
    Genre: Educational: Network Security
    Skill Level: Intermediate
    Price: -
    -
    Files: MP4 (+ Slides .PDF)
    Time: 02:19:08
    Video: AVC, 1280 x 720 (1.778) at 30.000 fps, 200 kbps
    Audio: AAC at 60 Kbps, 2 channels, 44.1 KHz



    Networks are complex systems of many components that operate in an insecure world. In this course, you will learn how to design and manage secure networks to protect your organizations and improve your effectiveness in managing a security program.

    Networks provide the foundation for almost every business operation and they require careful architecture and management. This course, Secure Network Design, will help you understand the challenges and solutions for designing secure networks. First, you will learn about types of communication. Next, you will gain an understanding of network devices. Finally, you will learn about network design, configuration, and management. By the end of this course, you how to secure and protect networks, secure all of the devices connected to networks, and overall, become a more proficient and effective security professional.


    Lessons:
    1. Course Overview
    01. Course Overview
    2. The Evolution of Network Communications
    02. The Evolution of Network Communications: Part One
    03. The Evolution of Network Communications: Part Two
    04. The Evolution of Network Communications: Part Three
    05. Network Connectivity: Part One
    06. Network Connectivity: Part Two
    07. Network Connectivity: Part Three
    08. Wide Area Networks
    09. Other Types of Networks
    3. Secure Network Configuration
    10. Secure Network Configuration: Part One
    11. Secure Network Configuration: Part Two
    12. Wireless Network Security: Part One
    13. Wireless Network Security: Part Two
    14. Network Security Devices: Part One
    15. Netowrk Security Devices: Part Two
    16. Network Security Components: Part One
    17. Netowrk Security Components: Part Two
    4. Secure Network Operations
    18. Secure Network Operations
    19. Network Monitoring


    -------------