Information Security Primer
4.4 (10 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
681 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Information Security Primer to your Wishlist.

Add to Wishlist

Information Security Primer

Secure Your Network in 12 (not so) Simple Steps
4.4 (10 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
681 students enrolled
Created by Dave Sirof
Last updated 4/2015
English
Curiosity Sale
Current price: $10 Original price: $25 Discount: 60% off
30-Day Money-Back Guarantee
Includes:
  • 2 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Gain a solid background in computer network security
  • Learn how to secure a large or small computer network using the 12 Step method
View Curriculum
Requirements
  • Some knowledge of IT basics is helpful, but not necessary
Description

In this course you will learn to secure a network, weather it's Enterprise or SOHO.

The course in based on over my 20 years hands on experience in IT, as a security analyst and network engineer.

Learn the 12 most important steps in securing you network, making sure you cover all the basics, but not wasting time on activities that contribute little.

Step 1- Write a Security Policy

Step 2 - Educate End Users & IT Staff

Step 3 - Implement Physical Security

Step 4 - Implement Perimeter Security

Step 5 - Use Good Password Management

Step 6 - Eliminate Unnecessary Services

Step 7 - Implement Good Patch Management

Step 8 - Implement AntiVirus Measures

Step 9 - Implement Access Control

Step 10 - Secure Data in Transit

Step 11 - IDS & IPS

Step 12 - Backup Your Data

Following a lecture on each of the steps, I provide 10 Live Demos to reinforce the lectures

Who is the target audience?
  • Anyone that needs to secure a network, including IT Engineer / Security Analyst, manager with limited technical knowledge, or the owner of a SOHO
Students Who Viewed This Course Also Viewed
Curriculum For This Course
25 Lectures
02:07:12
+
Course Description & Basic Concepts
2 Lectures 09:51

Describes what you will learn in this course

Preview 02:11

Understand some basic Concepts of Network Security, before we tackle Step 1

Basic Concepts
07:40
+
The 12 Steps
12 Lectures 01:01:44

Explains the importance of writing a security policy and what to include in it

Step 1 - Write a Security Policy
05:46

Explains the importance educating Staff & what topics to educate on

Step 2 - Educate End Users & IT Staff
02:56

Explains the importance of Physical Security & how to achieve it

Preview 05:24

Explains the importance of Perimeter Security & how to achieve it

Step 4 - Implement Perimeter Security
10:38

Explains the importance of Good Password Management & how to achieve it

Step 5 - Use Good Password Management
05:30

Includes a primer on services. Explains the importance of Eliminating Unnecessary Services & how to achieve it.

Step 6 - Eliminate Unnecessary Services
04:32

Explains the importance of Good Patch management & how to achieve it.

Step 7 - Implement Good Patch Management
02:59

Explains how to achieve a good Anti-Virus stance

Step 8 - Implement AntiVirus Measures
04:39

Explains the importance of Good Access Control & how to achieve it.

Step 9- Implement Access Control
04:55

Explains the importance of Securing Data in Transit & how to achieve it.

Step 10 - Secure Data in Transit
06:44

Explains what you need to know about Intrusion Prevention Systems

Step 11 - IDS & IPS
04:06

Explains what you need to know about Backing up your data

Step 12- Backup Your Data
03:35
+
The Lab Demos
10 Lectures 55:10

Learn how to eliminate Rogue Access Points using inSSIDer from Metageek

Step 3 Lab - inSSIDer Live Demo
07:01

We demonstrate basic firewall principles using the SonicWALL Security Appliance as an example

Step 4 Lab - Live Firewall Demo
09:48

Learn how to eliminate unnecessary services using Netstat from the command prompt


Step 6 Lab - Netstat Live Demo
04:04

Learn how to eliminate unnecessary services using the popular free tool NMAP

Step 6 Lab - Nmap Live Demo
05:19

We demonstrate basic patch management principles using LANDesk as an example

Step 7 Lab - LANDesk Overview
03:39

We demonstrate basic Anti-Virus principles using the SonicWALL Security Appliance as an example

Step 8 - Live Antivirus Demo
05:55

We demonstrate an example of a good enterprise Anti-Virus solution, namely McAfee EPO

Step 8 Lab - McAfee EPO Overview
04:22

We demonstrate basic VPN principles using the SonicWALL security appliance as an example

Preview 06:52

We demonstrate basic IPS principles using the SonicWALL security appliance as an example

Step 11 Lab - Live IPS Demo
03:58

We demonstrate an example of a good enterprise Backup solution, namely Symantec Backup Exec

Step 12 - Backup Exec Demo
04:12
+
Conclusion
1 Lecture 00:27
The End
00:27
About the Instructor
Dave Sirof
4.4 Average rating
10 Reviews
681 Students
1 Course
Network Security Engineer

Over 20 Years experience in IT.

Highly experienced, certified Network Engineer, with both technical expertise and excellent communication skills. Proven track record configuring, monitoring, troubleshooting and securing a large Network in a Data Center environment, as well a supervising employees. Expertise in configuring & troubleshooting Wireless LAN. Skilled technical writer. Telephone tech support dealing with complex security issues. Expertise in Network Security.