menu
menu
Sign up
Log in
About
Week 7 - Network & Application Security II
Course content
Firewall
Introduction
Section 1
3
lessons
Week 7 - Kickoff
What Is a Firewall?
How Do Firewalls Work?
Host-based Firewalls
Section 2
6
lessons
2
еxams
Windows Firewall - Tool Introduction
Firewall in Windows
Ready, Set, Lab! - Configuring Windows Firewalls
Week 7 - Configuring Windows Firewalls
2
Questions
Iptables - Tool Introduction
Firewall in Linux
Ready, Set, Lab! - Configuring Chain Rules in Iptables
Week 7 - Configuring Chain Rules in Iptables
2
Questions
Network-based Firewalls
Section 3
3
lessons
1
exam
What is Segmentation?
Host-Based Firewall vs. Network-Based Firewall
Ready, Set, Lab! - Creating Network-Based Firewall
Week 7 - Creating Network-Based Firewall
2
Questions
IDS & IPS
Introduction
Section 1
5
lessons
What are IDS and IPS?
How Does an IDS Function?
IDS Approaches
The Role of an IPS
NIDS & HIDS
Snort
Section 2
5
lessons
1
exam
Snort - Tool Introduction
Snort Rules
Snort Modes
Snort Cheat Sheet
Ready, Set, Lab! - Snort Detections and Analysis
Week 7 - Snort Detections and Analysis
2
Questions
IDS & IPS Lab
Section 3
2
lessons
Ready, Set, Lab! - IDS - Real life Scenario
IDS The Mission
Week 7 - IDS - Real life Scenario
Section 4
1
exam
Week 7 - IDS - Real life Scenario
2
Questions
DLP
DLP
Section 1
6
lessons
Data Loss Prevention
DLP Objectives
Types of DLP
How Does It Work?
DLP Best Practices
DLP - Knowledge Check
SIEM
SIEM Architecture
Section 1
8
lessons
What is SIEM?
How Does It Work?
SIEM Architecture
SIEM Alert Structure
Correlation Rules
Correlation Rules - Practice
SIEM Objectives
What Is Splunk?
Splunk
Section 2
5
lessons
1
exam
Splunk - Tool Introduction
Splunk Features
Splunk Components
Splunk's Interface
Ready, Set, Lab! - Splunk Investigation and Dashboarding
Week 7 - Splunk Investigation and Dashboarding
2
Questions
SIEM - Real-Life Scenario
Section 3
2
lessons
1
exam
Ready, Set, Lab! - SIEM Real Life Scenario
SIEM Real Life Scenario - The Case
Week 7 - SIEM Real Life Scenario
2
Questions
EDR
Endpoint Detection & Response
Section 1
1
lesson
Endpoint Detection & Response
EDR Key Components
Section 2
1
lesson
EDR Key Components
EDR Data Collection
Section 3
1
lesson
EDR Data Collection
How Does It Work?
Section 4
5
lessons
EDR Phases
Detection
Triage
Investigation
Remediation
EDR vs Security Products
Section 5
3
lessons
Differences Between AV and EDR
Differences Between SIEM and EDR
The Importance of EDR
Module Closure
Module Closure
Section 1
5
lessons
1
exam
Week 7 - Key Takeaways
Week 7 - Weekly Quiz
10
Questions
Network & Application Security Glossary
Summary
Tools Overview
Network & Application Security Ongoing Learning