Data network security is more important than ever. This course will examine critical network attacks as well as tools, techniques, and policies that can help mitigate network attacks and data breaches.
Data breaches have become common place in national and world news, and because of this, engineers now find themselves in new roles in organizations, exclusively focused on securing information. In this course, Network Security Fundamentals, you will learn about the different types of attacks used to bring down networks, and/or steal data from them. First, you will examine the physical security of data centers, password creation recommendations, user account privileges, and devices to monitor network behavior. Next, you will learn about techniques for mitigating these attacks. Finally, you will learn about mechanisms for encrypting wireless traffic. By the end of this course, you will know the difference between WEP, WPA, WPA2, and how you can use multifactor authentication to prevent unauthorized account access.
Authentication and Access Controls Welcome to Pluralsight. I'm Ross Bagurdes. This is Authentication and Access Controls. Let's take a look what we're going to cover in this module. We're going to look at authorization, authentication, and accounting, or AAA. This is not the same AAA in the United States that we use for American Automobile Association. We don't use that to get our TripTiks anymore. This is a system used in IT for allowing users access to systems. We're going to look at multifactor authentication and see what we can use for multifactor authentication and maybe see some examples where we're already using it today. Last, we'll look at access control and see what mechanisms we have that allow us to prevent users from gaining access to our network before they're authorized to do so.
Wireless Network Security Welcome to Pluralsight. I'm Ross Bagurdes. Let's get into this next module here where we discuss wireless network security. We're going to take a look at some of the options available here to us when we are trying to secure our Wi-Fi networks. Our goals this module will be to look at wireless network encryption options, we'll then take a look at how we can authenticate wireless networks, and then we're going to look at something nifty called geofencing that can be used to help prevent unauthorized access to your wireless network.
Network Attack Vectors Welcome to Pluralsight. I'm Ross Bagurdes. This module is Network Attack Vectors, meaning what is a network attacker? It's a nefarious person. What is it that they are going to use to gain access to our systems? So we're going to look at a variety of these types of attacks. We'll start off here by examining the difference between a vulnerability and an exploit. We'll then look at some attacks that can be done against people themselves. In fact, a lot of network attacks happen just from asking people for their username and password. Another type of attack here is a denial-of-service attack, or a DoS attack. We also have wireless attacks, man-in-the-middle attacks, and some other attacks that we will discuss in this module.
Network Device Hardening Welcome to Pluralsight. I'm Ross Bagurdes. This next module is Device Hardening. What device hardening means is we are going to make our network devices, and servers, and workstations as difficult as possible to attack and get into as we can. Our goals this module are going to be to look at configuration changes we can make to help harden our devices, make them more difficult to access by non-authorized users. We'll look at software updates and how critical they are, as well as disabling unused services on our workstations.
Network Attack Prevention Welcome to Pluralsight. I'm Ross Bagurdes. This last module in our Network Security course is going to be Threat Mitigation. What this means is what are we doing in our network to help prevent attackers from gaining access. Now there's no possible way I can cover all of threat mitigation in this one little module of our course. Pluralsight has hundreds of courses on security and methods of mitigating threats. What I'd like to do in this module is just give you a very high-level and brief overview of what we do in a network to prevent threats from attacking our internal resources. I've broken this down into several categories. We're going to look at the internet edge and see what it is that we put in between our private networks and our internet to prevent attacks from happening. We'll look a little bit more at device hardening. We'll look at users and data, and then testing and auditing.