menu
menu
Sign up
Log in
About
Chapter 08 - Network and Application Security II
Course content
Chapter Kick-off
Chapter Kick-off
Section 1
1
lesson
Network & Application Security II Chapter Kick-off
Firewall
Firewall Founddations
Section 1
2
lessons
What Is a Firewall?
How Do Firewalls Work?
Host-based Firewalls
Section 2
4
lessons
Ready, Set, Lab! - Configuring Windows Firewalls
Iptables - Tool Introduction
Firewall in Linux
Ready, Set, Lab! - Configuring Chain Rules in Iptables
Network-based Firewalls
Section 3
2
lessons
What is Segmentation?
Host-Based Firewall vs. Network-Based Firewall
IDS & IPS
IDS & IPS Foundations
Section 1
5
lessons
What are IDS and IPS?
How Does an IDS Function?
IDS Approaches
The Role of an IPS
NIDS & HIDS
Snort
Section 2
5
lessons
Snort - Tool Introduction
Snort Rules
Snort Modes
Snort Cheat Sheet
Ready, Set, Lab! - Snort Detections and Analysis
IDS & IPS Lab
Section 3
3
lessons
Ready, Set, Lab! - IDS - Real life Scenario
IDS The Mission
LS: IDS - Real Life Scenario
SIEM
SIEM Architecture
Section 1
7
lessons
What is SIEM?
How Does It Work?
SIEM Architecture
SIEM Alert Structure
Correlation Rules
Correlation Rules - Practice
SIEM Objectives
Splunk
Section 2
7
lessons
What Is Splunk?
Splunk - Tool Introduction
Splunk Features
Splunk Components
Splunk's Interface
Ready, Set, Lab! - Splunk Investigation and Dashboarding
LS: Splunk Investigation and Dashboarding
SIEM - Real-Life Scenario
Section 3
3
lessons
Ready, Set, Lab! - SIEM Real Life Scenario
SIEM Real Life Scenario - The Case
LS: SIEM Real Life Scenario
Chapter Closure
Chapter Closure
Section 1
1
exam
Network & Application Security II Quiz
10
Questions
Teachers
Brandon Cheong
0.0