Course Overview
Enhance your network security through robust practices in authentication authorization and cryptography. By the end of this course, you will be able to protect your data by implementing security authentication, cryptography, and other essential IT security practices. You will explore different types of access control models, such as discretionary, mandatory, and role-based access control, uncovering where each is applied in a networking context. Additionally, you will gain hands-on experience with security tools and technologies used for enforcing access control in networks. The course will also cover the legal and regulatory requirements impacting network security, ensuring you know how to maintain compliance. You will delve into network logging, which creates a digital record of all network activities and provides IT and Security teams with a centralized view to log and track users, network traffic, and changes. System and Network logging is an essential practice for maintaining the security, reliability, and performance of computer networks. It enables organizations to detect and respond to security threats, comply with regulatory requirements, and optimize network operations. You will implement network logging within a Local Area Network (LAN) and discuss how logging differs between Linux, Windows, and appliances. With the skills gained in this course, you will be able to describe encryption concepts and explain the use of digital certificates within a network. You will also be equipped to describe auditing and logging, firewall technologies, and public and private key infrastructure (PKI).