Network Security - Advanced Topics

Aspen Olmsted, NYUx

Learn advanced topics in network security, including Security Monitoring, Perimeter Security, IPv6 and IPv6 Security.

This is a self-paced course that provides a continuation of network security topics. Among the topics covered are Security Monitoring, Perimeter Security, IPv6, and IPv6 Security. The material is essential in later classes that will develop ethical hacking skills. Students are introduced to the concept of network security monitoring to detect intrusions instead of merely protecting against them.
Next, we discuss securing the perimeter of networks through the use of firewalls.
We follow up by introducing the student to IPv6: what it is, why it was developed, how it compares to the IPv4 protocol, and techniques to implement IPv6 devices alongside IPv4 devices. This lesson will prepare you for upcoming material focused on IPv6 security issues.
We conclude the course by leveraging the early work in IPv6, and we spend the time discussing IPv6 security. You'll learn about security threats that exist in IPv4 and IPv6 and issues exclusive to IPv6 and countermeasures to these threats.

What will you learn

  1. Explain what information is collected and analyzed through network security monitoring, and why monitoring is important
  2. Define network security monitoring
  3. Summarize the policies used in network security monitoring
  4. Define an Intrusion Detection System/Intrusion Prevention System, and provide a real-world analogy for an IDS
  5. Define the base rate fallacy and summarize an example
  6. Summarize the options for deploying an IDS
  7. Describe common strategies attackers use to evade an IDS
  8. List potential indicators of a security attack
  9. Define honeypots and honeynets and list their benefits to organizations
  10. Summarize the goals of a firewall
  11. List and define four types of firewalls
  12. Summarize an example of a filtering rule
  13. Explain the primary function of NAT
  14. Summarize the advantages and disadvantages of proxy gateways
  15. Explain the process for setting up firewalls using IPTables and Netfilter in Linux
  16. List the steps in an incoming packet's journey through a Linux firewall
  17. Summarize the challenges that led to the development of IPv6 and explain how IPv6 addresses those challenges
  18. List the differences in IPv4 and IPv6 services and headers
  19. Differentiate between IPv4 and IPv6 address formats
  20. List and define IPv6 address types
  21. List the differences between IPv4 and IPv6 address provisioning
  22. List the differences between DHCPv4 and DHCPv6
  23. Summarize dual-stack techniques for IPv4 and IPv6 devices
  24. Identify security threats common to IPv4 and IPv6, as well as threats exclusive to IPv6
  25. Describe how reconnaissance methods will change under IPv6
  26. List tools that can be use to compromise IPv6 networks
  27. Describe the security considerations needed in dual-stack host environments

会期:
  • 2020年12月16日
介绍:
  • 免费:
  • 收费:
  • 证书:
  • MOOC:
  • 视频讲座:
  • 音频讲座:
  • Email-课程:
  • 语言: 英语 Gb

反馈

目前这个课程还没有反馈。您想要留第一个反馈吗?

请注册, 为了写反馈

Show?id=n3eliycplgk&bids=695438
NVIDIA
还有这个题目的:
15-561s05 Information Technology Essentials
This class offers a broad coverage of technology concepts and trends underlying...
6-897s04 Selected Topics in Cryptography
This course covers a number of advanced "selected topics" in the field of cryptography...
59491_6311_10 Online Linux Training - Linux Server Tutorial
This course highlights more advanced linux concepts and provides study material...
Symmetry-edit An Exploration of Symmetry (Eligible for NTU Credit)
[IF YOU ARE LOOKING FOR THE NO-CREDIT ON-DEMAND VERSION OF THIS COURSE PLEASE...
Coursera_course_logo Programming Cloud Services for Android Handheld Systems
In this course----the third in a trans-institution sequence of MOOCs on Mobile...
还有标题«计算机科学»:
795999aa-6a59-42ac-ba38-feec9ec2be7f-95fe84bc13fd.small Penetration Testing - Exploitation
Learn exploitation phase of penetration testing, including the foundations of...
2cc77eb5-e1b3-4d57-87f6-bf071804e2ab-1d34e01a3545.small Penetration Testing - Post Exploitation
Learn post-exploitation phases of penetration testing, including Owning, Pivoting...
7ca98c09-a207-40c7-8a84-b9c48ecdf920-f25c990d1f5f.small Cloud Computing Engineering and Management
Learn methods for managing cloud computing projects and build an understanding...
9395b535-1fa7-4ed4-9fd8-98b86ba682d9-98e1ff5caeec.small UX Research
In this MOOC you will learn how to connect with users at every step of a digital...
61be438f-28b9-4339-9437-21c34b3c3dd6-e9ecfcecaf58.small UX Prototyping
Become a prototyping virtuoso! Master the ability to propel your creative team...
还有edX:
795999aa-6a59-42ac-ba38-feec9ec2be7f-95fe84bc13fd.small Penetration Testing - Exploitation
Learn exploitation phase of penetration testing, including the foundations of...
66a5462a-1a44-4010-b419-d313d9218090-d8d4d0d32eba.small Statistical Predictive Modelling and Applications
Learn how to apply statistical modelling techniques to real-world business scenarios...
F8d26e31-a9ea-4891-8e4d-ccf3be0e10f2-af109b42c4db.small Project Finance: Funding Projects Successfully
Learn the key strategies used by project managers to generate crucial funding...
1e7ac3ee-58cb-47dd-b887-b845fca21a82-a170765fa771.small Efficient HVAC Systems
Learn how to decide on efficient combinations of energy conversion systems and...
89db1e57-5bf9-4f4e-82a1-9cdb09c6846e-f6e1130fc6b5.small Business success in the screen industries: how to pitch your script and self-produce
Learn how to network in the creative industries, how pitch your film to a producer...

© 2013-2019