Certified in Cybersecurity Part 4 and 5 with Chris Nelson
Domain 4: Network Security
🔐 Key Concepts:
Basic Networking Components
Routers, switches, firewalls, proxies, and load balancers
OSI model: 7 layers (especially Layers 3, 4, 7)
Secure Network Design
Network segmentation (DMZ, internal/external zones)
VPNs and remote access
Zero Trust Network Architecture (ZTNA)
Common Protocols
TCP/IP, HTTPS, DNS, FTP, SMTP, SSH, etc.
Use secure versions (e.g., SFTP instead of FTP)
Firewalls and Intrusion Detection/Prevention
Packet filtering, stateful inspection, application layer filtering
IDS vs. IPS (detect vs. prevent)
Wireless Security
WPA3 over WPA2
Risks of open/public Wi-Fi
✅ Domain 5: Security Operations
🛡️ Key Concepts:
Monitoring and Logging
Importance of event logs, system logs, and audit trails
Use of SIEM tools (Security Information and Event Management)
Incident Response
Key phases: preparation, detection, containment, eradication, recovery, lessons learned
Reporting and escalation procedures
Business Continuity and Disaster Recovery
BCP vs. DRP: keeping the business runningvs. recovering from a disaster
Backups, redundancy, RTO/RPO
Physical Security Controls
Access cards, CCTV, biometrics
Protecting server rooms and devices
User Awareness and Training
Ongoing security awareness programs
Phishing simulations and policy training
Видео Certified in Cybersecurity Part 4 and 5 with Chris Nelson канала Pinnacle Learning Centres
🔐 Key Concepts:
Basic Networking Components
Routers, switches, firewalls, proxies, and load balancers
OSI model: 7 layers (especially Layers 3, 4, 7)
Secure Network Design
Network segmentation (DMZ, internal/external zones)
VPNs and remote access
Zero Trust Network Architecture (ZTNA)
Common Protocols
TCP/IP, HTTPS, DNS, FTP, SMTP, SSH, etc.
Use secure versions (e.g., SFTP instead of FTP)
Firewalls and Intrusion Detection/Prevention
Packet filtering, stateful inspection, application layer filtering
IDS vs. IPS (detect vs. prevent)
Wireless Security
WPA3 over WPA2
Risks of open/public Wi-Fi
✅ Domain 5: Security Operations
🛡️ Key Concepts:
Monitoring and Logging
Importance of event logs, system logs, and audit trails
Use of SIEM tools (Security Information and Event Management)
Incident Response
Key phases: preparation, detection, containment, eradication, recovery, lessons learned
Reporting and escalation procedures
Business Continuity and Disaster Recovery
BCP vs. DRP: keeping the business runningvs. recovering from a disaster
Backups, redundancy, RTO/RPO
Physical Security Controls
Access cards, CCTV, biometrics
Protecting server rooms and devices
User Awareness and Training
Ongoing security awareness programs
Phishing simulations and policy training
Видео Certified in Cybersecurity Part 4 and 5 with Chris Nelson канала Pinnacle Learning Centres
Комментарии отсутствуют
Информация о видео
20 июня 2025 г. 6:51:51
01:11:16
Другие видео канала