Time
33 hours 23 minutes
Difficulty
Beginner
CEU/CPE
33

Video Transcription

00:00
Hello and welcome to the Sai Buri Comp Tia Security plus certification preparation course
00:09
we continue on and his brand new module, which is marginal. My three and the topic discussion would be architecture and design.
00:17
Here, again is the objective which encompasses domain three, which CEPA states given a scenario, implement secure network architecture concepts.
00:28
The first item on our agenda is a pre assessment quiz, and it reads as follows when setting the site to site B, P and
00:36
virtual Private network. In other words, it should be using always on mode as opposed to a dial on demand. Is this true or false?
00:47
In this case, if you select the true, you're absolutely correct,
00:53
as mentioned earlier here again, its objective, which encompasses Deuce Domain, which seven estates given a scenario, it meant secure network architectural concepts.
01:03
Here again are the objectives which encompasses this particular objective. First of all, we'll take a look at zones and apologies. We'll discuss what a D M Z is an extra net Internet,
01:15
while its guests
01:18
honey nets net
01:19
as well as ad hoc.
01:23
So without further let's begin by first are taking a look at zones and apologies. Now When you think about topology refers to the physical on logical layout of a network. It defines the way it was different, knows a place and interconnected with each other.
01:37
Ultimately,
01:38
network topology may describe how the data is transferred between these notes.
01:46
So let's first of all, take a look at exactly what is DMC.
01:51
Now Dems is an area in a network they allows limited in control access from the public Internet, also called the neutral zone, Also refer to as your parameter network.
02:02
Then we have the extra Net,
02:05
which is a special in a network architecture in which a Contini organization, external partners and customers are granted access to some parts of its Internet
02:15
and the services provided in a secure control manner.
02:21
Internet means simply within, and this is in fact, a portion of your information technology infrastructure that belongs to and it controlled by the company in question.
02:31
Wallace, it is a term used describe telecommunication in which electromagnetic waves, rather than some form of while carrying the signal or part off all the communication path. In fact, this example, what we call unguided media
02:47
got it mean you'll be put comprised up
02:51
cables or fiber optics and so forth.
02:54
Turnout. Tito What guess.
02:58
And we think about a guest. A guest network is a separate network used for visitors. Gets other people not directly associate with your organization.
03:08
And then we have a hunting it
03:10
basically ah 100 net is consist of data, for example, in a network site that appears to be legitimate part of the site, but it's actually isolated and monitor. Now, in this case, when you have a honeypot, we have a bunch of 100 pots connected together. They're considered a hunting net.
03:29
Then we have a net withstand for network address translation and simple what it does. It translates the I P address of the computers in a local network to a single I p address.
03:42
Then we have at home.
03:43
An ad hoc network is a temporary network using lose to temporarily connect computers together,
03:50
continuing with our objectives. Given a scenario, implement secure network architecture concepts
03:55
here again on objectives which encompasses this particular objective.
04:01
What we gonna do now discuss the terms segregation and segmentation or isolation,
04:09
physical as well as logical, or VPN virtual proud virtual land.
04:14
They will discuss virtualization, as was the term air gaps.
04:19
Let's not turn out to tour the discussion of segregation segmentation in isolation.
04:25
Simply put, it's the practice of splitting your computer network into sub networks or networks segments, also known as zoning
04:33
mess, continued discretion, UHF, segregation, segmentation and isolation.
04:39
Did you know that segmentation is the practice of splitting your computer network into sub networks or network segments known as zoning?
04:47
The number one reason is to protect the security your network resource is and information.
04:53
Let's not turn our attention towards some key concepts that fall within this particular parameter, such as physical.
05:00
Basically, think about physicals. It comprises a process by which you physically separate your network. You use independent network heart with such a short routers, switches and firewalls,
05:11
then we have, ah, logical, be land basic. This is the logical segmentation, usually by using be lands, which enables you to set men your network by using software logic. Surprising enough, the only device in which you actually can set up a villain or configure be land is with a switch.
05:29
Then we have a term call virtualization
05:31
simply put virtualization technology developed to allow a guest operating system to run along with the host operates system with one set of hardware,
05:43
then we have air. Gapped,
05:45
basically is a computer that is not connected to the Internet or connected to any other advice that are connected to the Internet.
05:51
Continue over the discussion of the objective. Given a scenario, Implement secure network architecture concepts here again on some additional concepts or objectives, which encompasses this particular objective. We would be turned out tension tour discussion, tunneling as well. It's VPN
06:09
site, the site and, lastly, remote access.
06:14
The first item margin is called talent, or BP in
06:17
VPN stands for virtual private network.
06:21
Simply put is a technology that enables the use of unsecure public network as if it were a secure private network.
06:30
Some additional terms that you need to be aware of.
06:33
We have site the site
06:35
site. The site VPN is one that's connect to sites together.
06:41
Then we have remote access. VPN is one that enables remote workers to connect to the organization's network from anywhere on the Internet.
06:51
Let's continue to highlight 3.2 given a scenario imprint secure network architecture concepts
06:59
within this particular object that we have a number of different sub topics we need to highlight. First of all, security and advice technology placement sensors, collectors, correlation engines, filters, proxies, firewalls, VP and concentrators
07:15
SSL accelerators, low balancers
07:18
dolls, migrate ER's
07:20
aggregation switches, taps, import mirrors
07:26
and Leslie Software defined network.
07:30
Let's not turn teaches or the discussion of security device or technology placement.
07:35
Many network devices have multiple components, which communicate with devices to provide features and improve performance.
07:46
Let's take a look at some concept that you need to be. Well, call senses
07:49
now, since we're gonna be defined as a data gathering agent,
07:55
then we have our collectors. They are agent together data from census or other inputs
08:01
correlation engines. They aggregate and correlate content from different sources to uncover. An attack
08:09
filter is a mechanism that reduces the total amount of data you collect or view,
08:13
and lastly, we have proxies. These devices act as substitutes on behalf off the primary device.
08:22
They will have a firewalls. Now, Firewall is a software firmware that enforced a set of rules about what data packet will be allowed to enter a leave your network,
08:35
A V P and concentrator is a type of networking advice that provide secure creation of your VPN connections and deliver your messages between your BP and notes.
08:46
An SSL a cell aerator is like a load balancer and often the same device.
08:52
SSL celebrated A typically place
08:54
in your local area network for internal for your internal service or in your D M Z For public facing servers,
09:03
your loan balances Basin is a technology that helps to even describe it work across a network.
09:11
Then we have on adults migrate er's
09:13
basis, a set of techniques or tools for resistant on migrating. The impact of descriptive that now serves attack on your networks are attached to the inet by protected a target and your relay network
09:28
aggregation switch.
09:30
The address is twist. What it does. It connects multiple switches in a mo called a link aggregation.
09:37
Then we have our taps import mirrors,
09:39
basically that tap support mirrors you used to capture your network communication.
09:46
The last item Arjun is called a software defined networking, or STN.
09:52
It is a method by which organisations can manage your network services through a decouple underlying infrastructure, allowing quick adjustment to changing business requirements.
10:03
Perhaps another definition that that falls within the parameter is it's what basically the STN. It's where package or right up do a controlled control. In other words, whether that a traditional router which improves the overall performance
10:20
at this point time we have a post assessment quiz, in fact is a true a false statement.
10:26
And it reads as follows.
10:28
The purpose of a firewall is to prevent unauthorized access to the network and is also vital that no. One employee, it was a sponsor maintaining the rules.
10:39
Is this a true a false statement?
10:46
In this case, if you select the true, you're absolutely correct.
10:50
Let's not turn our teacher toward the key takeaways from this particular video presentation.
10:56
Doing this practical presentation we learned in the VPN technology and able to use a unsecure public networks as if they were a secure, private network.
11:05
We learned that a site to site VP and is one that connects to sites together
11:11
well under the revolt excess BP anyone that enables workers to connect to an organization network from anywhere on the Internet.
11:20
We learned that a honeypot consists of data, for example, in a network site that appears to be a legitimate part of sight, but it's actually isolated and monitored That's what a honey pot is.
11:31
Wallace is a term uses for our telecommunication,
11:35
in which electromagnetic weighs whether than some former why carries a signal over part of all of the communication pound.
11:45
A guest network is a separate network used for visitors. Guess other people not directly associated with your organization.
11:52
In our upcoming presentation, we'd be taking a look at a brand new objective, which is 3.3, given a scenario if met, secure system designed and again, I want to thank you very much for your attention to detail, and I look forward to see you in a very next
12:07
video.

Up Next

CompTIA Security+

Interested in the cybersecurity industry? The CompTIA Security+ is the gold standard for those looking to enter the cybersecurity industry. Join thousands of professionals who have gained this certification through this course and launched their careers in information security.

Instructed By

Instructor Profile Image
Jim Hollis
Independent Contractor
Instructor