logo

Week 7 - Network & Application Security II

Week 7 - Network & Application Security II
Course content
Firewall
Week 7 - Kickoff
What Is a Firewall?
How Do Firewalls Work?
Windows Firewall - Tool Introduction
Firewall in Windows
Ready, Set, Lab! - Configuring Windows Firewalls
Week 7 - Configuring Windows Firewalls
2Questions
Iptables - Tool Introduction
Firewall in Linux
Ready, Set, Lab! - Configuring Chain Rules in Iptables
Week 7 - Configuring Chain Rules in Iptables
2Questions
What is Segmentation?
Host-Based Firewall vs. Network-Based Firewall
Ready, Set, Lab! - Creating Network-Based Firewall
Week 7 - Creating Network-Based Firewall
2Questions
IDS & IPS
What are IDS and IPS?
How Does an IDS Function?
IDS Approaches
The Role of an IPS
NIDS & HIDS
Snort - Tool Introduction
Snort Rules
Snort Modes
Snort Cheat Sheet
Ready, Set, Lab! - Snort Detections and Analysis
Week 7 - Snort Detections and Analysis
2Questions
Ready, Set, Lab! - IDS - Real life Scenario
IDS The Mission
Week 7 - IDS - Real life Scenario
2Questions
DLP
Data Loss Prevention
DLP Objectives
Types of DLP
How Does It Work?
DLP Best Practices
DLP - Knowledge Check
SIEM
What is SIEM?
How Does It Work?
SIEM Architecture
SIEM Alert Structure
Correlation Rules
Correlation Rules - Practice
SIEM Objectives
What Is Splunk?
Splunk - Tool Introduction
Splunk Features
Splunk Components
Splunk's Interface
Ready, Set, Lab! - Splunk Investigation and Dashboarding
Week 7 - Splunk Investigation and Dashboarding
2Questions
Ready, Set, Lab! - SIEM Real Life Scenario
SIEM Real Life Scenario - The Case
Week 7 - SIEM Real Life Scenario
2Questions
EDR
Endpoint Detection & Response
EDR Key Components
EDR Data Collection
EDR Phases
Detection
Triage
Investigation
Remediation
Differences Between AV and EDR
Differences Between SIEM and EDR
The Importance of EDR
Module Closure
Week 7 - Key Takeaways
Week 7 - Weekly Quiz
10Questions
Network & Application Security Glossary
Summary
Tools Overview
Network & Application Security Ongoing Learning

ThriveDX