Proper firewall configuration and placement can increase network and host security along with intrusion detection systems. This course will cover what you need to know about security solutions from concepts to implementation.
Malicious users and software continuously scan networks looking for vulnerable devices and hosts. In this course, Firewalls and Intrusion Detection, you'll acquire the ability to determine how various types of firewalls should be deployed in your specific environment. First, you'll discover how to implement an intrusion detection system to detect suspicious activity. Next, you'll learn how to determine between honeypots and honeynets. Finally, you'll explore how honeynets and honeypots can be used as IT system decoys to track intruder actions in order to learn how production systems should be hardened. When you have completed this course, you will have the skills to implement various types of firewalls for specific environments.
Daniel Lachance, CompTIA Security+™, CompTIA A+®, CompTIA Network+®, CompTIA Server+, CompTIA Cloud Essentials, MCITP, MCTS, MCSA, is the owner of Lachance IT Consulting Inc. He is the author of the CompTIA Server+ Certification All-in-One Exam Guide, CompTIA Cloud Essentials Certification Study Guide, and co-author of CompTIA Security+ Certification Practice Exams.
Hi everyone, I’m Dan Lachance, and welcome to my course, Firewalls and Intrusion Prevention.
Firewalls control traffic into and out of not only networks, but also individual hosts. Proper firewall placement and configuration is essential for proper protection at these levels. Intrusion detection and prevention systems take security a step further by monitoring networks and hosts for suspicious activity and either sending alerts or taking steps to stop malicious actions.
To track intrusions on fake decoy systems, honeypots, or collections of honeypots, called honeynets, can be deployed on an isolated network. This provides IT security technicians with valuable information about current attack methods and intruder IP addresses.
Some of the major topics that we will cover include:
Defining firewall best practices including rules and placement
Intrusion detection and prevention system deployment and configuration
The benefits of deploying honeypots
By the end of this course, you’ll understand how to secure hosts and networks in alignment with corporate security policies using firewalls, intrusion detection and prevention systems, and honeypots.
I hope you’ll join me to learn about Firewalls and Intrusion Prevention, here at Pluralsight.