12.4 Threat Defense and Security Management Solutions

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
11 hours
Difficulty
Intermediate
CEU/CPE
15
Video Transcription
00:00
Hello. Welcome back. Cisco Certified Design Associate Mulder. 12 Lie Central Point for on the Instructor Wing.
00:08
In the previous video, we talked about a secure service's problem. This video. We will begin to introduce a fried defense and security manager in the solutions.
00:17
Here's the pre assessment question. When designing the infrastructure protection person for the Enterprise badge, which solution would be the most appropriate? A solution to consider a a zero to that one acts B A C l's in accord earlier. See Cisco Security Mars, the Tebow A. We go into D.
00:37
Here's the topical will discuss
00:40
infrastructure protection. The infrastructure needs to be protected using security features. And the service is to meet growing needs of a business without a disruption. Infrastructure protection, in the process of taking steps to reduce the risks and the rights to the network infrastructure
00:58
and to maintain the integrity and a high availability of never resource is
01:02
by using best practices in a security policy you can secure and the heart in the infrastructure agreement to prevent a potential attacks to combat the network of frights, Cisco has enhanced this system. I rise and I os x e with the security features to support the security infrastructure and increase the network's availability.
01:22
Here are some the recommended best practices for infrastructure protection
01:26
Using out of a bend old be managing the network to separate a management that related a trafficker from a production that traffic access is that really a cream into remotely with sshh rather than with the Tonette
01:40
In that worst raging infrastructure, use a B p d o guard roof, Garden of Eden and trunk ing particle Beaky P with the motor transparent
01:48
in never switching infrastructure, use Artie Inspection and a DHD to be small snooping
01:53
in their work. Assuaging infrastructure. Used control. Clean policing. Copp. You strip away up for authenticating on administrative access, authorizing privileges and logging all user recessions. Multiple Triple A servers can also be used to the increase of fault tolerance of the two boys. Surfaces
02:12
universes log traction reviewed along. Sir. For further analysis,
02:15
use the same phone Erica Management Protocol version free as an MTV three, for it's a Security privacy features
02:23
disable I use the network Service is such as PCP, small servers and UDP small servers use as ftp rotted anti ftp to managing images.
02:34
Use access classes to restrict access to management and a command. My innovation CEO I enable routing protocol authentication when available, such as a hence the Interrogator way. Routing protocol. Yeah, Sharpie open the shortest path First West PF Prada Gold
02:50
Intermediate A system to intermediate a system are yes. Ah yes, on a barter gateway product GDP
02:55
use. I use the Venus for the Native Vienna or report. Do you know how to use the little one?
03:04
Security Management Solutions Security Management Solutions are used to monitor control and the support network infrastructure. The same tours can be helpful during that God AIDS and can save demonstrators a considerable amount of a time. Security Management Solutions provided the following
03:21
collects a interprets on presents information
03:24
provisions and there were security policies for deployment maintains consistency By tracking policy. Cheney's monitors at com Activity on dhe provides a rule based access control are back. Ah, strong security implementation is only as good as the policies that are used.
03:43
One of the biggest. The risks with a good A security implementation is policy. Ever.
03:46
The network operations personnel need to fully understand the security policies, processes and tours so that it can respond quickly when a security incident on arises.
04:00
Learning jack question number one. We travel the falling benefits it does. A security management solution provides a sand scans.
04:09
Be provisions. There were security policies for a deployment. See prevents unauthorized access. Be a nap skin. It's going to be right. Security Management Solutions provided ways to provisioned that working security policies for years about deployment
04:26
cross number two each. Two solutions are part of the system. Security management streets. Choose to a neck appliance be picks. See Cisco security agents Thesis those security Mars E A s A F C S M. We go with Mars and the CSM.
04:44
Mars is in the security monitoring, analysis and a response system. Was security monitoring Toro for network devices?
04:51
CSM that Cisco security manager helps to enable consistent policy enforcement and a right bit of trouble shooting of a superior events offering summarize the recent reports across the security deployment.
05:05
In today's brief lecture, we discussed Thrive, defense and Security management solutions.
05:12
Any questions? Feel free to contact me. Otherwise I'll see you in the next video Bye for now
Up Next