Network Security Essentials
About Course
While organizations strive to block as many attacks as possible, it’s inevitable that some will slip through and need to be detected quickly. Therefore, understanding how to construct a defensible network architecture is crucial, including the types of network designs and communication flows involved.
Next, it’s important to recognize that not all data holds the same level of importance within an organization. Some data is routine, while other data is sensitive and critical, and its loss can cause severe harm. Familiarity with the communication protocols of modern networks is essential to grasp how network-based attacks pose risks to crucial data and make organizations vulnerable.
Cloud computing is a key topic when considering modern public and private networks. A comprehensive discussion on defensible networking must include an examination of cloud security capabilities and related challenges.
Adversaries rely on our networks just as much as we do. They navigate and pivot through our systems to reach their goals. By understanding our network operations and how they serve our unique needs, we can more effectively detect and disrupt adversary activities.
Course Content
Introduction Network Security Essentials
-
Introduction