Register Account


Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Comprehensive Security Course (CSC)
#1
Video 
[Image: 998d9f285fdeeccdc8a3025c5fd5ae82.jpeg]
Free Download Comprehensive Security Course (CSC)
Published 1/2024
Created by Lazaro (Laz) Diaz
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English | Duration: 18 Lectures ( 6h 33m ) | Size: 5.45 GB

Security for Server, Networking Devices & Security Concepts
What you'll learn:
They will learn the basics of how networks are structured, common vulnerabilities and the principles of securing a network
They will learn about different types of networking devices and how to properly secure them.
They will learn the importance of firewalls in a perimeter network
They will learn how to configure ACL at different layers of your Network.
Requirements:
A basic understanding of Networking.
Description:
Introduction to the Course- "Through this course, we will give you a comprehensive introduction to Network Security. Indeed, we will explain the technical concepts; the level will therefore be accessible to everyone. If you already have computer prerequisites, this will undoubtedly be useful, but it is not mandatory."Starting with the Basics- "In the first learning section, we will speak on the security professional, threats to cyber security, types of security attacks, and physical security."Mitigation Techniques"Next, we will discuss several topics on how we can mitigate attacks through the use of ACLs, VACLs, and also a variation of Named ACLs as well as look into securing WLAN networks."Dive into Microsoft Server and Active Directory- "Through the final section, we will briefly look into the Microsoft server, specifically the active directory to centralize the login, and security for all user accounts and end devices."- "Understanding active directories when working in a Microsoft environment is crucial to the company. Within an active directory not only can you harden user accounts through the use of GPOs and file sharing permissions, but also an array of many other security enhancements that AD provides, such as CAs, group permissions, and creating least privileged policies."Conclusion and Key Takeaways- "In conclusion, this course will give you a lot of technical and conceptual information for you to be able to secure a network with at least the minimum guidelines. When it comes to security, you must use a layered approach and add some sort of security from top to bottom."
Who this course is for:
This course is for individuals looking to enter network or security engineering positions.
Homepage

[To see links please register or login]






Recommend Download Link Hight Speed | Please Say Thanks Keep Topic Live

[To see links please register or login]

No Password - Links are Interchangeable
[Image: signature.png]
Reply


Download Now



Forum Jump:


Users browsing this thread:
1 Guest(s)

Download Now