PLU | Network Security Basics | Network Security Fundamentals (2018 EN)

Discussion in 'Information Technology' started by Kanka, Jul 21, 2019.

  1. Kanka

    Kanka Well-Known Member Loyal User

    Messages:
    16,047
    Likes Received:
    449
    Trophy Points:
    83
    [​IMG]

    Company: Pluralsight
    Author: Ross Bagurdes
    Full Title: Network Security Basics | Network Security Fundamentals
    Year: 2018
    Language: English
    Genre: Educational: Networking
    Skill Level: Beginner
    Price: -
    -
    Files: MP4 (+ Slides .PDF)
    Time: 02:16:21
    Video: AVC, 1280 x 720 (1.778) at 15.000 fps, 450 kbps
    Audio: AAC at 76 Kbps, 2 channels, 44.1 KHz



    Data network security is more important than ever. This course will examine critical network attacks as well as tools, techniques, and policies that can help mitigate network attacks and data breaches.

    Data breaches have become common place in national and world news, and because of this, engineers now find themselves in new roles in organizations, exclusively focused on securing information. In this course, Network Security Fundamentals, you will learn about the different types of attacks used to bring down networks, and/or steal data from them. First, you will examine the physical security of data centers, password creation recommendations, user account privileges, and devices to monitor network behavior. Next, you will learn about techniques for mitigating these attacks. Finally, you will learn about mechanisms for encrypting wireless traffic. By the end of this course, you will know the difference between WEP, WPA, WPA2, and how you can use multifactor authentication to prevent unauthorized account access.


    Lessons:
    1. Course Overview
    01. Course Overview
    2. Physical Security Devices
    02. Introduction and Module Goals
    03. Video Surveillance
    04. Asset Tracking
    05. Facility Access
    06. Summary
    3. Authentication and Access Controls
    07. Introduction and Module Goals
    08. AAA and AAA Server Options
    09. Authentication
    10. Logging and Auditing
    11. Multifactor Authentication
    12. Access Control
    13. Demo: Examine Port Security
    14. Summary
    4. Wireless Network Security
    15. Introduction and Module Goals
    16. Wireless Network Encryption
    17. Wireless Encryption, Authentication, and Authorization
    18. Demo: Examine Wireless Access Point Security Options
    19. Geofencing
    20. Summary
    5. Network Attack Vectors
    21. Introduction and Module Goals
    22. Vulnerabilities and Exploits
    23. Human Exploits
    24. Social Engineering
    25. Denial of Service (DOS) Attacks
    26. Wifi Attacks
    27. Rogue AP Attacks
    28. Man-in-the-middle Attack
    29. Password Attacks
    30. Summary
    6. Network Device Hardening
    31. Introduction and Module Goals
    32. Configuration Changes
    33. Demo: Generating Crypto Keys
    34. Software Updates
    35. Demo: File Hash Verification
    36. Disabling Unused Service
    37. Summary
    7. Network Attack Prevention
    38. Introduction and Module Goals
    39. Internet Edge
    40. Device Hardening
    41. Users and Data
    42. Auditing
    43. Summary


    -------------