CompTIA Security+ (SY0-401) Network Security

This course covers CompTIA Security+ (2014 Objectives): Domain 1 - Network Security.
Course info
Rating
(327)
Level
Beginner
Updated
Oct 17, 2014
Duration
3h 48m
Table of contents
Getting Started
Security Configuration Parameters
Secure Network Administration Principles
Network Design Elements
Common Protocols and Services
Wireless Security
Description
Course info
Rating
(327)
Level
Beginner
Updated
Oct 17, 2014
Duration
3h 48m
Description

CompTIA Security+ (2014 Objectives) prepares networking and IT professionals with the knowledge and skills required to identify risk, to participate in risk mitigation activities, and to provide infrastructure, application, information, and operational security. In addition, the successful candidate will be given the skills to be able to accurately apply security controls to maintain confidentiality, integrity, and availability, identify appropriate technologies and products, and troubleshoot security events and incidents.

About the author
About the author

Chris is a lifelong learner and professional information technologist, trainer and IT Manager. Married with 3 children, Chris is interested in martial arts, working out, spending time with family and friends and being creative whenever possible.

More from the author
More courses by Christopher Rees
Section Introduction Transcripts
Section Introduction Transcripts

Getting Started
Hello and welcome to Pluralsight. My name is Christopher Rees and I am your instructor for the CompTIA Security+ course. Let's go ahead and get started and see what we're going to look at today.

Secure Network Administration Principles
Hi welcome to Pluralsight and this module on Secure Network Administration Principles. In this module we're going to cover a number of things, so I'm going to print out the list here for you in a moment, don't worry it's not as bad as it seems. Alright, we have a lot of things to cover here, but what I'm going to do is break it into sections because some of these concepts kind of logically lump together. For instance, ruled-based management, firewall rules, implicit deny, secure router configuration, and ACLs, access control lists, are going to deal with securing the flow of traffic. Then we're going to have securing and separating network segments, that's going to be covered by VLAN management and network separation. Then we're going to deal with securing the physical access to the network and that deals with port security and 802. 1x, and then we're going to talk about ensuring the availability of the network and that deals with flood guards and loop protection. And then we'll look at proactive review and analysis of security logs dealing with log analysis and UTM or unified threat management.