Learn your way! Get started

CompTIA Security+, Part 1: Network Security

with expert Ryan Hendricks


Watch trailer

CompTIA Security+, Part 1: Network Security Trailer

Course at a glance

Included in these subscriptions:

  • Dev & IT Pro Video
  • Dev & IT Pro Power Pack
  • Power Pack Plus

Release date Release date 1/15/2016
Level Level Intermediate
Runtime Runtime 1h 57m
Closed captioning Closed captioning Included
Transcript Transcript Included
eBooks / courseware eBooks / courseware N/A
Hands-on labs Hands-on labs N/A
Sample code Sample code N/A
Exams Exams Included


Enterprise Solutions
Enterprise Solutions

Need reporting, custom learning tracks, or SCORM? Learn More



Course description

In this course we will discuss the plethora of security devices found on the network. As a security professional you need to understand how these devices work, the methods used to implement security, and the design considerations needed when deploying them. We will cover all of these topics while keeping our focus on the security of the network. Security should be at the forefront of priorities, not an afterthought. This class will be a step in becoming a security conscientious individual. This course will cover the CompTIA Security+ objectives 1.1, 1.2, and 1.3.

Prerequisites

This course assumes that the user has working knowledge of networks and networking. Ideally, the user should have their CompTIA Network+ certification, but can be replaced with networking experience.

Learning Paths

This course will help you prepare for the following certification and exam:
CompTIA Security+ Certification

Meet the expert

Ryan Hendricks Ryan Hendricks is an experienced instructor who teaches networking and security courses to IT professionals throughout the nation. He currently has the CompTIA Certified Technical Trainer (CTT+ Classroom) and the Cisco Certified Academy Instructor (CCAI) credentials. He holds certifications from (ISC)2, EC-Council, CompTIA, and Cisco. When not on the podium instructing, he delves into IT books, always looking to learn more and keep up with the latest security topics.


Course outline



Network Security

Devices (27:57)
  • Introduction (00:21)
  • Switches (02:27)
  • Switches, Cont. (02:27)
  • Routers (01:55)
  • Routers, Cont. (01:19)
  • Firewalls (01:04)
  • Firewalls, Cont. (01:39)
  • Packet Filtering Firewall (01:30)
  • Packet Filtering Firewall, Cont. (01:29)
  • Stateful Firewall (01:43)
  • Stateful Firewall, Cont. (00:56)
  • Application Based Firewall (00:55)
  • App Based Firewall, Cont. (01:19)
  • Web Application Firewall (02:45)
  • Load Balancer (01:09)
  • Proxies (01:34)
  • Web Security Gateway (00:55)
  • VPN Concentrator (01:53)
  • Summary (00:28)
Devices 2 (20:26)
  • Introduction (00:24)
  • Intrusion Detection & Prevention (01:24)
  • IDS & IPS Rules (01:16)
  • IDS & IPS Rules, Example (02:30)
  • Network IDS & IPS Placement (01:23)
  • Detection Techniques (01:32)
  • Detection Techniques, Cont. (04:24)
  • Protocol Analyzer (00:54)
  • Protocol Analyzer, Cont. (00:43)
  • Spam Filter (01:55)
  • Unified Threat Management (01:30)
  • URL Filtering (00:23)
  • Content Inspection (00:20)
  • Malware Inspection (00:33)
  • Application Aware Devices (00:43)
  • Summary (00:25)
Administration (37:28)
  • Introduction (00:27)
  • Rule-Based Management (03:08)
  • Rule Definitions, Cont. (00:52)
  • Explicit and Implicit Rules (00:48)
  • Firewall Rules (00:41)
  • Firewall Rules, Cont. (00:27)
  • Firewall Illustration (01:18)
  • VLAN Management (01:27)
  • VLAN Illustration (01:24)
  • VLANs (01:22)
  • Secure Router Configuration (02:23)
  • Access Control List (01:17)
  • ACLs, Cont. (00:44)
  • Port Security (00:46)
  • Port Security, Cont. (01:49)
  • 802.1x (01:33)
  • 802.1x, Cont. (01:05)
  • Flood Guards (00:39)
  • Loop Protection (00:41)
  • Loop Protection, Cont. (01:09)
  • Network Separation (00:22)
  • Network Separation, Cont. (00:51)
  • Log Analysis (00:47)
  • Log Analysis, Cont. (01:40)
  • Demo: Firewall Rules (03:28)
  • Demo: New Firewall Rule (05:49)
  • Summary (00:20)
Design (31:23)
  • Introduction (00:20)
  • Demilitarized Zone (00:34)
  • DMZ illustration (00:41)
  • DMZ Devices (01:30)
  • Subnetting (01:50)
  • VLANs (00:49)
  • VLAN Illustration (02:13)
  • Network Address Translation (02:16)
  • NAT, Cont. (01:08)
  • Port Address Translation (01:50)
  • IPv4 Link-Local Range (01:14)
  • Remote Access (01:24)
  • Telephony (00:59)
  • Telephony, Cont. (00:44)
  • Network Access Control (01:17)
  • Virtualization (01:23)
  • Virtualization, Cont. (02:21)
  • Cloud Computing (00:23)
  • Essential Characteristics (02:12)
  • Service Model: SaaS (01:10)
  • Service Model: PaaS (01:00)
  • Service Model: IaaS (01:01)
  • Deployment Models (01:25)
  • Layered Security (01:11)
  • Summary (00:17)