Real-Time Cyber Threat Detection and Mitigation
Module 4 Enterprise Network Security
This module introduces the limitations of perimeters, and the challenges in the enterprise of dealing with threats such as DDOS and APT.
• Analyze the limitations of the perimeter for modern enterprise
• Explain APT solutions and how the perimeter helps the attack
• Review third party security solutions
• Examine common case studies in APT attacks
• Compare DDOS protection solutions and their limitations
About this course: This course introduces real-time cyber security techniques and methods in the context of the TCP/IP protocol suites. Explanation of some basic TCP/IP security hacks is used to introduce the need for network security solutions such as stateless and stateful firewalls. Learners will be introduced to the techniques used to design and configure firewall solutions such as packet filters and proxies to protect enterprise assets. Perimeter solutions such as firewalls and intrusion prevention systems are shown to have significant drawbacks in common enterprise environments. The result of such weakness is shown to often exist as advanced persistent threats (APTs) from nation-state actors. Such attacks, as well as DDOS and third-party attacks, are shown to have potential solutions for modern enterprise.
To get certificate subscribe at: