In this course, you will learn and explore Network and Communication Security. You will learn to understand security issues related to networks, protect telecommunications technologies, control network access, manage LAN-based security, operate and configure network-based security devices, and implement and operate wireless technologies.
Jason Helmick is an author for Pluralsight. His IT career spans more than 25 years or enterprise consulting on a variety of technologies, with a focus on strategic IT business planning. He’s a highly successful IT author, columnist, lecturer, and instructor, specializing in automation practices for the IT pro.
Protect Telecommunications Technologies Think about all the different types of data that you receive, that you want to receive. You receive news, maybe you read a newspaper or you get news on the television, you get entertainment on the television. Think about how you're receiving it and the devices that you're receiving it on. Here's a question for you, do you still have a telephone that's hard wired in your house? A lot of us don't anymore. A lot of us, we still need that data, we still need people to be able to call us, but now we use a mobile phone. We even use that mobile phone in our homes rather than this, well kind of old fashioned, physically attached phone. It's not that we don't need the data, we found better ways to do it. And it's not just out with the old and in with the new when it comes to technology, we're in the midst of where we converge these technologies together for some period of time, maybe a long period of time. So when you think back, as you started this course, all of the things that we've talked about so far, topologies and media access methods, all of these are going to start get combined into a convergence and that's what we want to take a look at in this module. So here's what we're going to do, we're going to just talk about converge communications. It's a pretty short conversation because you'll get the idea really quick, and then we want to talk about attacks and countermeasures and it's not that if you've been following this entire series that you haven't heard some of this before, it's that I want to shed some new light on this with the new information that we have and you'll start to see, well this is actually really important that we take certain tactics when we want to secure our information. So let's get started with converge communications.
Control Network Access Networks should be private places where people can go to work with the knowledge that someone isn't trying to steal their data and steal everything about them. Yeah it's a little bit over the top, but you know, quite honestly, everyone, you know, that accesses a network should have some level of confidence that the work that they were doing is only for authorized people, this is why we, well, why we have people get authenticated to the network in the first place. Now we've talked about authentication, as a matter of fact, the very first course, access controls, if you want more details on it. But with this addition of all of the network topologies that we looked at, we want to kind of drill a little bit more in from how do people get authenticated to the network if they're in different locations. Internally it's pretty straightforward, but what if they're remote? And so we want to get into more depth about how that works and things that we need to watch out for and some of the technologies that we use for this. So here's what we're going to do, we're going to start off by looking at access control and monitoring and this is the concept of what access control to the network is and the tools that can do some monitoring for us and then we want to look at some of the standards and protocols. This also means the types of devices that you'll be setting up or that you will be responsible for monitoring that will be out there. And just as a reminder, a little bit of review, but even more so with our new topology information, we want to take a look at some of the remote access operation and configuration and how to secure this as well. So let's get started with the concept of access control.