Explore the principles behind perimeter security
In this course you will explore the different network topologies. You will learn to deploy security solutions and become familiar with concepts of perimeter security based on firewalls.
- Network protocols security issues
- Port security
What will you achieve?
By the end of the course, you‘ll be able to...
- Describe the security implication of different network topologies
- Evaluate and deploy network internal and perimeter security solutions
- Describe the concepts of perimeter security based on firewalls
- Demonstrate the rule manipulations in firewalls and IDS
Who is the course for?
This course is designed for people familiar with basic computing who want to learn about the techniques and technologies of network security.
Please note that the individuals detailed in the “Who will you learn with?” section below, are current staff members and may be subject to change.