The Understand Network Isolation module provides you with the instruction and Server hardware to develop your hands on skills. This module includes the following exercises:

  • Demonstrating Routing
  • Securing Network Transmission with IPsec
  • Configuring Server and Domain Isolation
  • Configuring a Honeypot

Exercise 1 - Demonstrating Routing

In this exercise, you will learn the following using Windows Server 2008 R2:

  • Demonstrating routing
  • Configuring NAT
  • Configuring VPN
  • Configuring IPSec
  • Configuring Server and Domain Isolation
  • Configuring HoneyPot

Exercise 2 - Securing Network Transmission with IPsec

In this exercise, you will configure Internet Protocol Security (IPSec) to encrypt network communication between two computers. Encryption helps secure data against unauthorised access or malicious use by non-corporate network users. IPSec secures network traffic from eavesdropping by protocol analyzers. This is just one of the technologies that you can utilize to protect your data from read and interpreted by unauthorized users.

Exercise 3 - Configuring Server and Domain Isolation

A Server and Domain Isolation solution is based on Microsoft Windows Internet Protocol security (IPsec) and the Active Directory service. It helps administrators to create a layer of security by dynamically divide their Windows environment into secure and isolated logical networks based on policy and without making much modifications to their network infrastructure or applications.

The benefits of server and domain isolation are:

  • Protects against costly network attacks
  • Prevents of unauthorized access to trusted networked resources
  • Achieves regulatory compliance
  • Reduces operational costs.

Exercise 4 - Configuring a Honeypot

Honeypots are security resource consisting of different applications for security. It helps to capture unauthorized or malicious attacks on a computer. It is used for prevention, detection or information gathering. It is classified into two categories: Production and Research honeypot. Production honeypot are used in companies or corporations. They are easy to deploy and maintain. They can capture only limited information and are designed to capture known activity. Research honeypots are complex to deploy and maintain. They can capture huge information and are used by research, military or government organization.

In this task, we will learn to download and configure honeypot.

Comprehensive Learning

See the full benefits of our immersive learning experience with interactive courses and guided career paths.