1 00:00:00,000 --> 00:00:01,290 In this section of the course, 2 00:00:01,290 --> 00:00:03,630 we're going to discuss logical security. 3 00:00:03,630 --> 00:00:06,300 Now, logical security refers to the non-physical measures 4 00:00:06,300 --> 00:00:08,310 that are implemented to protect digital data, 5 00:00:08,310 --> 00:00:10,950 restrict unauthorized access, and ensure data integrity 6 00:00:10,950 --> 00:00:13,980 and confidentiality through various different methods. 7 00:00:13,980 --> 00:00:16,530 Now, in this section, we're going to be focused on Domain 1, 8 00:00:16,530 --> 00:00:20,130 networking concepts and Domain 4, network security. 9 00:00:20,130 --> 00:00:22,620 Objective, 1.4 states that you must be able to explain 10 00:00:22,620 --> 00:00:24,240 common networking ports, protocols, 11 00:00:24,240 --> 00:00:25,830 services, and traffic types. 12 00:00:25,830 --> 00:00:28,020 And Objective 4.1 states that you must be able 13 00:00:28,020 --> 00:00:29,580 to explain the importance of basic 14 00:00:29,580 --> 00:00:31,020 network security concepts. 15 00:00:31,020 --> 00:00:33,690 And Objective 4.3 states that given a scenario, 16 00:00:33,690 --> 00:00:35,970 you must be able to apply network security features, 17 00:00:35,970 --> 00:00:38,160 defense techniques, and solutions. 18 00:00:38,160 --> 00:00:40,320 Now, first we're going to look at IAM, 19 00:00:40,320 --> 00:00:42,420 or identity and access management. 20 00:00:42,420 --> 00:00:43,800 Now, identity and access management 21 00:00:43,800 --> 00:00:46,380 is a framework of policies and technologies that ensure 22 00:00:46,380 --> 00:00:48,660 that the right individuals have the appropriate access 23 00:00:48,660 --> 00:00:51,570 to technology resources within an organization. 24 00:00:51,570 --> 00:00:54,390 Then, we're going to discuss multifactor authentication. 25 00:00:54,390 --> 00:00:57,033 Multifactor authentication, also known as MFA, 26 00:00:57,033 --> 00:00:58,740 is a security system that requires 27 00:00:58,740 --> 00:01:00,900 two or more methods of authentication 28 00:01:00,900 --> 00:01:03,000 from independent categories of credentials 29 00:01:03,000 --> 00:01:05,640 to verify your user's identity when they try to log in 30 00:01:05,640 --> 00:01:07,440 or access a resource. 31 00:01:07,440 --> 00:01:08,850 Next, you're going to learn about the different 32 00:01:08,850 --> 00:01:10,800 authentication methods used in our networks, 33 00:01:10,800 --> 00:01:13,140 and after that, we're going to explore some security principles 34 00:01:13,140 --> 00:01:15,570 used in our networks like utilizing least privilege 35 00:01:15,570 --> 00:01:17,880 and utilizing the right type of access control methods 36 00:01:17,880 --> 00:01:19,620 for your specific use case. 37 00:01:19,620 --> 00:01:21,390 Then, we're going to cover encryption 38 00:01:21,390 --> 00:01:24,270 and discuss both symmetric and asymmetric encryption methods 39 00:01:24,270 --> 00:01:26,040 and their specific use cases. 40 00:01:26,040 --> 00:01:29,100 Next, we'll look at IPSec, or internet protocol security, 41 00:01:29,100 --> 00:01:31,410 and how it works, and the use of authentication headers 42 00:01:31,410 --> 00:01:33,030 and encapsulating security payloads 43 00:01:33,030 --> 00:01:35,130 to better securely transmit our network's data 44 00:01:35,130 --> 00:01:36,990 over an untrusted network. 45 00:01:36,990 --> 00:01:38,970 After that, we're going to explore PKI, 46 00:01:38,970 --> 00:01:41,310 or the public key infrastructure, which is at the heart 47 00:01:41,310 --> 00:01:43,860 of all of our digital certificates, digital signatures, 48 00:01:43,860 --> 00:01:46,800 and asymmetric encryption technologies that we use today. 49 00:01:46,800 --> 00:01:49,080 Then, we're going to discuss digital certificates, 50 00:01:49,080 --> 00:01:50,220 including the different types 51 00:01:50,220 --> 00:01:52,320 and when you should use each type of digital certificate 52 00:01:52,320 --> 00:01:53,610 inside of your networks. 53 00:01:53,610 --> 00:01:55,470 I'll also perform a quick demonstration 54 00:01:55,470 --> 00:01:57,300 so you can better understand how to read the contents 55 00:01:57,300 --> 00:01:59,730 of a digital certificate for some famous websites 56 00:01:59,730 --> 00:02:02,280 like Google.com and Apple.com. 57 00:02:02,280 --> 00:02:04,230 Next, we're going to explore key management 58 00:02:04,230 --> 00:02:06,030 and how you can securely create, manage, 59 00:02:06,030 --> 00:02:09,030 and destroy your security keys throughout their lifecycle. 60 00:02:09,030 --> 00:02:11,160 Finally, we'll take a short quiz to see what you learned 61 00:02:11,160 --> 00:02:12,420 during this section of the course, 62 00:02:12,420 --> 00:02:13,830 and review your answers to ensure you know 63 00:02:13,830 --> 00:02:15,090 why the right answers were right 64 00:02:15,090 --> 00:02:16,620 and the wrong answers were wrong. 65 00:02:16,620 --> 00:02:19,230 So if you're ready, let's get started with our coverage 66 00:02:19,230 --> 00:02:21,730 of logical security in this section of the course.