Description
Course info
Level
Intermediate
Updated
February 8, 2018
Duration
1h 42m
Description

Malicious users and software continuously scan networks looking for vulnerable devices and hosts. In this course, Firewalls and Intrusion Detection, you'll acquire the ability to determine how various types of firewalls should be deployed in your specific environment. First, you'll discover how to implement an intrusion detection system to detect suspicious activity. Next, you'll learn how to determine between honeypots and honeynets. Finally, you'll explore how honeynets and honeypots can be used as IT system decoys to track intruder actions in order to learn how production systems should be hardened. When you have completed this course, you will have the skills to implement various types of firewalls for specific environments.

About the author
About the author

Daniel Lachance, CompTIA Security+™, CompTIA A+®, CompTIA Network+®, CompTIA Server+, CompTIA Cloud Essentials, MCITP, MCTS, MCSA, is the owner of Lachance IT Consulting Inc. He is the author of the CompTIA Server+ Certification All-in-One Exam Guide, CompTIA Cloud Essentials Certification Study Guide, and co-author of CompTIA Security+ Certification Practice Exams.

More from the author
Managing Microsoft Azure Subscriptions
Beginner
1h 58m
10 Aug 2018
Network Monitoring and Analysis
Intermediate
1h 27m
28 Mar 2018
VPNs and Wireless Networks
Intermediate
1h 38m
12 Mar 2018
More courses by Daniel Lachance
Transcript
Transcript

Hi everyone, I’m Dan Lachance, and welcome to my course, Firewalls and Intrusion Prevention.

Firewalls control traffic into and out of not only networks, but also individual hosts. Proper firewall placement and configuration is essential for proper protection at these levels. Intrusion detection and prevention systems take security a step further by monitoring networks and hosts for suspicious activity and either sending alerts or taking steps to stop malicious actions.

To track intrusions on fake decoy systems, honeypots, or collections of honeypots, called honeynets, can be deployed on an isolated network. This provides IT security technicians with valuable information about current attack methods and intruder IP addresses.

Some of the major topics that we will cover include:

  • Defining firewall best practices including rules and placement
  • Intrusion detection and prevention system deployment and configuration
  • The benefits of deploying honeypots

By the end of this course, you’ll understand how to secure hosts and networks in alignment with corporate security policies using firewalls, intrusion detection and prevention systems, and honeypots.

I hope you’ll join me to learn about Firewalls and Intrusion Prevention, here at Pluralsight.