Learn your way! Get started

CompTIA Sec+ SY0-401, Part 1 of 8: Network Security [Deprecated/Replaced]

with expert Ryan Hendricks


Watch trailer


Course at a glance

Included in these subscriptions:

  • Dev & IT Pro Video
  • Dev & IT Pro Power Pack

Release date 1/15/2016
Level Intermediate
Runtime 1h 57m
Closed captioning Included
Transcript Included
eBooks / courseware N/A
Hands-on labs N/A
Sample code N/A
Exams Included


Enterprise Solutions

Need reporting, custom learning tracks, or SCORM? Learn More



Course description

In this course we will discuss the plethora of security devices found on the network. As a security professional you need to understand how these devices work, the methods used to implement security, and the design considerations needed when deploying them. We will cover all of these topics while keeping our focus on the security of the network. Security should be at the forefront of priorities, not an afterthought. This class will be a step in becoming a security conscientious individual. This course will cover the CompTIA Security+ objectives 1.1, 1.2, and 1.3.

Prerequisites

This course assumes that the user has working knowledge of networks and networking. Ideally, the user should have their CompTIA Network+ certification, but can be replaced with networking experience.

Learning Paths

This course will help you prepare for the following certification and exam:
CompTIA Security+ Certification
SY0-401: CompTIA Security+

Meet the expert

Ryan Hendricks is an experienced instructor who teaches networking and security courses to IT professionals throughout the nation. He currently has the CompTIA Certified Technical Trainer (CTT+ Classroom) and the Cisco Certified Academy Instructor (CCAI) credentials. He holds certifications from (ISC)2, EC-Council, CompTIA, and Cisco. When not on the podium instructing, he delves into IT books, always looking to learn more and keep up with the latest security topics.

Course outline



Network Security

Devices (27:57)
  • Introduction (00:21)
  • Switches (02:27)
  • Switches, Cont. (02:27)
  • Routers (01:55)
  • Routers, Cont. (01:19)
  • Firewalls (01:04)
  • Firewalls, Cont. (01:39)
  • Packet Filtering Firewall (01:30)
  • Packet Filtering Firewall, Cont. (01:29)
  • Stateful Firewall (01:43)
  • Stateful Firewall, Cont. (00:56)
  • Application Based Firewall (00:55)
  • App Based Firewall, Cont. (01:19)
  • Web Application Firewall (02:45)
  • Load Balancer (01:09)
  • Proxies (01:34)
  • Web Security Gateway (00:55)
  • VPN Concentrator (01:53)
  • Summary (00:28)
Devices 2 (20:26)
  • Introduction (00:24)
  • Intrusion Detection & Prevention (01:24)
  • IDS & IPS Rules (01:16)
  • IDS & IPS Rules, Example (02:30)
  • Network IDS & IPS Placement (01:23)
  • Detection Techniques (01:32)
  • Detection Techniques, Cont. (04:24)
  • Protocol Analyzer (00:54)
  • Protocol Analyzer, Cont. (00:43)
  • Spam Filter (01:55)
  • Unified Threat Management (01:30)
  • URL Filtering (00:23)
  • Content Inspection (00:20)
  • Malware Inspection (00:33)
  • Application Aware Devices (00:43)
  • Summary (00:25)
Administration (37:28)
  • Introduction (00:27)
  • Rule-Based Management (03:08)
  • Rule Definitions, Cont. (00:52)
  • Explicit and Implicit Rules (00:48)
  • Firewall Rules (00:41)
  • Firewall Rules, Cont. (00:27)
  • Firewall Illustration (01:18)
  • VLAN Management (01:27)
  • VLAN Illustration (01:24)
  • VLANs (01:22)
  • Secure Router Configuration (02:23)
  • Access Control List (01:17)
  • ACLs, Cont. (00:44)
  • Port Security (00:46)
  • Port Security, Cont. (01:49)
  • 802.1x (01:33)
  • 802.1x, Cont. (01:05)
  • Flood Guards (00:39)
  • Loop Protection (00:41)
  • Loop Protection, Cont. (01:09)
  • Network Separation (00:22)
  • Network Separation, Cont. (00:51)
  • Log Analysis (00:47)
  • Log Analysis, Cont. (01:40)
  • Demo: Firewall Rules (03:28)
  • Demo: New Firewall Rule (05:49)
  • Summary (00:20)
Design (31:23)
  • Introduction (00:20)
  • Demilitarized Zone (00:34)
  • DMZ illustration (00:41)
  • DMZ Devices (01:30)
  • Subnetting (01:50)
  • VLANs (00:49)
  • VLAN Illustration (02:13)
  • Network Address Translation (02:16)
  • NAT, Cont. (01:08)
  • Port Address Translation (01:50)
  • IPv4 Link-Local Range (01:14)
  • Remote Access (01:24)
  • Telephony (00:59)
  • Telephony, Cont. (00:44)
  • Network Access Control (01:17)
  • Virtualization (01:23)
  • Virtualization, Cont. (02:21)
  • Cloud Computing (00:23)
  • Essential Characteristics (02:12)
  • Service Model: SaaS (01:10)
  • Service Model: PaaS (01:00)
  • Service Model: IaaS (01:01)
  • Deployment Models (01:25)
  • Layered Security (01:11)
  • Summary (00:17)