Network Defense Strategies
In this course, you’ll learn how to design, implement, and manage secure network infrastructures that can withstand evolving cyber threats.
Segment 00: Reading - Welcome to the Course
Segment 01: Intro Video to Course
Segment 02: Chapter Introduction
Segment 03: What is Network Security and Why It Matters
Segment 04: Common Threats and Attack Vectors
Segment 05: The CIA Triad and Security Design Principles
Segment 06: Security Zones and Segmentation
Segment 07: The Role of Subnetting and Addressing in Security
Segment 08: Introduction to VLANs and Network Isolation
Segment 09: Demo: VLAN Configuration on Switches
Segment 10: Demo: Inter-VLAN Routing and Trunking
Segment 11: VLAN Hopping Attacks and Mitigations
Segment 12: Reading - VLAN Best Practices and Security Tips for Cisco Business Routers
Segment 13: Hands-On-Learning - Creating VLANs and Implementing Inter-VLAN Routing
Segment 15: Chapter Introduction
Segment 16: What Are ACLs and Why They Matter
Segment 17: Standard vs. Extended ACLs
Segment 18: Applying ACLs to Interfaces and Traffic Flows
Segment 19: VPN Fundamentals and Encryption Concepts
Segment 20: Demo: Site-to-Site vs. Remote-Access VPNs
Segment 21: VPN Protocols: IPSec, SSL, and L2TP