From the course: CompTIA Security+ (SY0-601) Cert Prep: 8 Network Security Design and Implementation
Unlock the full course today
Join today to access over 22,500 courses taught by industry experts or purchase this course individually.
Continuing your studies
From the course: CompTIA Security+ (SY0-601) Cert Prep: 8 Network Security Design and Implementation
Continuing your studies
- [Mike] Thanks for watching my Security+ Network Security Design and Implementation course. It's been my pleasure to join you for this journey through the world of network security. I hope that as you've completed this course you found it interesting and helpful in preparing for the Security+ exam. You should now have a solid foundation for the network security questions that you're going to find on that test. If you're following my Security+ course series in order, you've now finished the eighth course and you're ready to move on to course nine covering Operations and Incident Response. Good luck with the rest of your test preparation.
Download courses and learn on the go
Watch courses on your mobile device without an internet connection. Download courses using your iOS or Android LinkedIn Learning app.
Contents
-
-
Restricting network access2m 8s
-
(Locked)
Network access control4m 30s
-
(Locked)
Firewall rule management4m 9s
-
(Locked)
Router configuration security4m 5s
-
(Locked)
Switch configuration security3m 42s
-
(Locked)
Maintaining network availability2m 34s
-
(Locked)
Network monitoring3m 41s
-
(Locked)
SNMP2m 54s
-
(Locked)
Isolating sensitive systems1m 58s
-
(Locked)
Deception technologies2m 51s
-
-
-
(Locked)
Denial of service attacks4m 15s
-
(Locked)
Eavesdropping attacks4m 12s
-
(Locked)
DNS attacks3m 30s
-
(Locked)
Layer 2 attacks2m 3s
-
(Locked)
Network address spoofing3m 38s
-
(Locked)
Wireless attacks2m 59s
-
(Locked)
Propagation attacks4m 19s
-
(Locked)
Preventing rogues and evil twins2m 50s
-
(Locked)
Disassociation attacks2m 10s
-
(Locked)
Understanding Bluetooth and NFC attacks2m 2s
-
(Locked)
RFID security2m 25s
-
(Locked)
-
-
(Locked)
Mobile connection methods4m 2s
-
(Locked)
Mobile device security3m 3s
-
(Locked)
Mobile device management6m 28s
-
(Locked)
Mobile device tracking3m 5s
-
(Locked)
Mobile application security3m 54s
-
(Locked)
Mobile security enforcement3m 54s
-
(Locked)
Bring your own device (BYOD)4m 35s
-
(Locked)
Mobile deployment models2m 55s
-
(Locked)
-
-
(Locked)
Ping and traceroute5m 48s
-
(Locked)
DNS tools4m 34s
-
(Locked)
Ipconfig, ifconfig, and route2m 28s
-
(Locked)
netstat1m 5s
-
(Locked)
netcat1m 47s
-
(Locked)
ARP1m 23s
-
(Locked)
curl3m 15s
-
(Locked)
theHarvester2m 57s
-
(Locked)
Cuckoo1m 4s
-
(Locked)
Port scanners3m 9s
-
(Locked)
Vulnerability scanners2m 21s
-
(Locked)