1 00:00:00,000 --> 00:00:01,260 In this section of the course, 2 00:00:01,260 --> 00:00:04,080 we're going to discuss some network security fundamentals. 3 00:00:04,080 --> 00:00:05,970 Now up to this point, we have really focused 4 00:00:05,970 --> 00:00:08,039 on making our networks functional and working 5 00:00:08,039 --> 00:00:10,080 in order to support our business needs. 6 00:00:10,080 --> 00:00:12,540 But we haven't really focused on security yet, 7 00:00:12,540 --> 00:00:14,820 and so we need to understand the basics of security, 8 00:00:14,820 --> 00:00:16,140 the threats against our networks, 9 00:00:16,140 --> 00:00:17,310 and how to manage that risk 10 00:00:17,310 --> 00:00:18,990 so we can effectively use our networks 11 00:00:18,990 --> 00:00:20,790 to meet our operational needs of our businesses 12 00:00:20,790 --> 00:00:24,270 and its users while making sure our data remains secure. 13 00:00:24,270 --> 00:00:26,460 So in this section, we're going to be focused solely 14 00:00:26,460 --> 00:00:28,500 on domain four network security, 15 00:00:28,500 --> 00:00:30,690 and we'll be covering two different objectives. 16 00:00:30,690 --> 00:00:33,300 Objective 4.1 states that you must be able to explain 17 00:00:33,300 --> 00:00:35,970 the importance of basic network security concepts. 18 00:00:35,970 --> 00:00:38,340 We'll also jump briefly into objective 4.3, 19 00:00:38,340 --> 00:00:39,720 which states that given a scenario 20 00:00:39,720 --> 00:00:42,000 you must be able to apply network security features, 21 00:00:42,000 --> 00:00:43,830 defense techniques, and solutions 22 00:00:43,830 --> 00:00:46,020 with our coverage for device hardening. 23 00:00:46,020 --> 00:00:48,450 Now, first we're going to look at the CIA Triad, 24 00:00:48,450 --> 00:00:50,820 which is focused on how we can ensure the confidentiality, 25 00:00:50,820 --> 00:00:53,490 integrity, and availability in our networks. 26 00:00:53,490 --> 00:00:54,810 Then we'll discuss threats 27 00:00:54,810 --> 00:00:56,250 and vulnerabilities in our networks 28 00:00:56,250 --> 00:00:58,440 and how you can't have a risk without both a threat 29 00:00:58,440 --> 00:01:00,330 and a matching vulnerability. 30 00:01:00,330 --> 00:01:02,220 Next, we're going to learn about risk management 31 00:01:02,220 --> 00:01:03,720 and how we can use it to guide our work 32 00:01:03,720 --> 00:01:04,830 as network administrators 33 00:01:04,830 --> 00:01:07,260 to best protect our networks against attacks. 34 00:01:07,260 --> 00:01:09,270 After that, we're going to be exploring audits 35 00:01:09,270 --> 00:01:10,890 and compliance, as well as discussing 36 00:01:10,890 --> 00:01:12,810 some contractual requirements and regulations 37 00:01:12,810 --> 00:01:16,350 associated with both PCIDSS and GDPR. 38 00:01:16,350 --> 00:01:18,180 Then we'll cover device hardening, 39 00:01:18,180 --> 00:01:20,190 including how you can disable unused ports, 40 00:01:20,190 --> 00:01:22,770 disable unused services, and change your default password 41 00:01:22,770 --> 00:01:25,440 on your devices to increase the security of your endpoints, 42 00:01:25,440 --> 00:01:27,510 your clients, and your network devices. 43 00:01:27,510 --> 00:01:29,610 I'll also perform a hands-on demonstration, 44 00:01:29,610 --> 00:01:31,530 so you can learn how you can implement device hardening 45 00:01:31,530 --> 00:01:33,570 on your own network clients too. 46 00:01:33,570 --> 00:01:35,550 Next, we'll take a look at physical security 47 00:01:35,550 --> 00:01:37,350 and its importance in our networks. 48 00:01:37,350 --> 00:01:39,120 After that, we'll explore honeypots 49 00:01:39,120 --> 00:01:40,410 and active defense methods 50 00:01:40,410 --> 00:01:42,570 that we can use to gather information and intelligence 51 00:01:42,570 --> 00:01:45,090 on our attacker's techniques and processes. 52 00:01:45,090 --> 00:01:46,710 Finally, we're going to take a short quiz 53 00:01:46,710 --> 00:01:48,720 to see what you learned during this section of the course 54 00:01:48,720 --> 00:01:49,950 and review your answers to ensure 55 00:01:49,950 --> 00:01:51,540 you know why the right answer was right 56 00:01:51,540 --> 00:01:53,340 and why the wrong answer was wrong. 57 00:01:53,340 --> 00:01:55,710 So if you're ready, let's get started with our coverage 58 00:01:55,710 --> 00:01:57,000 of network security fundamentals 59 00:01:57,000 --> 00:01:58,500 in this section of the course.