Learn to identify and analyze malicious code and activity, implement and operate endpoint device security, operate and configure cloud security, secure big data systems, and operate and secure virtual environments.
In this course, you will learn to identify and analyze malicious code and activity, implement and operate endpoint device security, operate and configure cloud security, explore secure big data systems, and operate and secure virtual environments.
Jason Helmick is an author for Pluralsight. His IT career spans more than 25 years or enterprise consulting on a variety of technologies, with a focus on strategic IT business planning. He’s a highly successful IT author, columnist, lecturer, and instructor, specializing in automation practices for the IT pro.
Implement and Operate Endpoint Device Security We've spent a lot of time in this entire series talking about making policies, and our access controls, and protecting the network, and the different layers at the network, and now we're more focused on our applications, and our client machines or any endpoint device for that matter, and so we want to drill a little bit deeper on some of the ways that you can protect these endpoint devices, and some of the tools that you can use to make a more secured, stable environment. Now what we're going to take a look at is things like a host intrusion detection and preventions systems, and a little bit more on host-based firewalls, and how they help protect us. Application white listing is very important, and is used often to restrict the types of applications that can be used. We also want to take a look at some of the endpoint encryption capabilities that are out there, and this ties into something called the TPM or the Trusted Platform Module. Also, some information on mobile device management and secured browsing, so let's get started right away with host intrusion, detection, and prevention systems.
Operate and Secure Virtual Environments Virtualization or virtual environments is one of the most important technologies used on your networks today, and whether you're using this with a cloud or not, matter of fact, I started to mention this when we were talking about cloud technologies, whether you're using a cloud or not, if you're just building a virtualized environment, this is critical to the operations of many networks because it allows us to optimize our hardware. It lowers our cost. It can even make our environments even more resilient than they were before, and that's why we want to spend just a few minutes talking more about this, and securing this. You know most of the security answers already, firewalls, and updates, that kind of stuff, but there are some concepts you need to understand, so you could see how we can secure it a little bit better, specifically towards our virtualized environments, and so here's what we're going to take a look at. We're going to look at the networking side of our virtual environments first, with our software-defined networking. This is the ability to do everything that we would normally do physically on a network, only without all the physical devices. We can all do it virtually. Then we'll look at the hypervisor and the virtual appliances that you could add to this environment, and we'll look at one of my favorite topics, the continuity and resilience of your environments, how to keep things up and running, and some of the options we have with virtualization, and along those same lines I want to show you how we can work with some shared storage with virtualization that might be surprising as well, so let's get started with Software-defined Networking.