Free
Infrastructure Security
From a threat landscape overview to applying defense-in-depth at the perimeter, network, endpoint, application, and data layers, this Infrastructure Security course covers it all. Network engineers, systems engineers, and security managers will walk away with a thorough understanding of how to apply these concepts to lock down their infrastructure.
4
H
26
M
Time
intermediate
difficulty
4
ceu/cpe
Course Content
Security Models
Security Models
Introduction
The Threat Landscape
Layers of Defense
Defense in Depth
Technology Vulnerabilities Part 1
The Threat Landscape
Firewalls
Defense in Depth
Technology Vulnerabilities Part 2
The Threat Landscape
DMZ
Defense in Depth
Process Vulnerabilities
The Threat Landscape
IPS/IDS
Defense in Depth
People Vulnerabilities
The Threat Landscape
Honeypots
Defense in Depth
Attacker Motivations
The Threat Landscape
Remote Access Part 1
Defense in Depth
MITRE
The Threat Landscape
Remote Access Part 2
Defense in Depth
Malware Types
The Threat Landscape
Encryption Part 1
Defense in Depth
Malware Identification
The Threat Landscape
Encryption Part 2
Defense in Depth
Web Proxies Part 1
Defense in Depth
Web Proxies Part 2
Defense in Depth
Network Access Control Part 1
Defense in Depth
Network Access Control Part 2
Defense in Depth
Wireless
Defense in Depth
Anti-Virus
Defense in Depth
Course Description