Install and Configure Network Components to Support Organizational Security Part 8

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
or

Already have an account? Sign In »

Time
33 hours 23 minutes
Difficulty
Beginner
CEU/CPE
33
Video Transcription
00:00
Hello and welcome back to Sai Berries. 2019 comp T A Security plus certification
00:06
preparation course.
00:08
We can continue in our discussion of margin number two,
00:11
and the topic of discussion will be domain to technologies and tools.
00:17
Here, again is one of the objectives which we're going. Continue discuss. In fact, this one of many objectives we're gonna highlight during this particular course of instruction or this particular video. In fact,
00:28
so again
00:29
we continue our discussion. 2.1. We just had it installed It get bigger network components, both hardware software based to support organizational security.
00:38
This brings us to our pre assessment quiz
00:41
and a question or quiz res. Ask balls
00:44
what could be used to ensure that someone cannot steal sister data by using a USB flash drive or email and data to that personal email account. Is it a data loss prevention? Be network access control,
00:59
see a sim serve or deport security.
01:04
If you say that the air you're absolutely correct. The correct method would be data loss prevention, because what it does if events data from being email I or taking from the file server using a USB drive
01:17
here again are the topics of discussion, which again encompasses this particular objective. Here,
01:23
we're gonna take a look at mail Gateway, and it's well asked, defined exactly. The bridges discuss SSL and also discuss hardware security module as well,
01:34
and the first thing we want to take a look. It's called a mail gateway.
01:38
Now mail Gateway is a device that sends and receives email, often
01:42
a mail gateways used on the edge of a network to enhance the security of the email environment.
01:49
It could indicate and validate traffic before the traffic reaches the internal email server.
01:57
Some important concepts that fall within the parameters of a mail gateway. We have spam filter.
02:02
Now. Spam Filter is a program that used to take unsolicited and unwanted email and prevent those Mrs from getting to a user's in box.
02:13
The LP with Stanford Data Loss prevention, is in fact a strategy from making sure that the end users do not send sensitive or critical information outside the corporate network.
02:24
Additionally, the terms used to describe software products that help a network administrator control what data and uses can in fact, transfer.
02:34
Then we have to take a look at encryption.
02:37
It's a method by which plain text or any other type of data is converted from a readable form to an encoded version. They can only be decoded by another entity if they have access to the decryption key.
02:51
AH bridges. AH, hardware devices software that is used to join two separate computer networks to enable communication between them.
03:00
Ah Bridge serves the same purpose it could next to arm or local area networks. Together, the cars or the data in this case used the bridge to travel to and from different areas of the network devices similar to around it, but it does not analyze the data being afforded.
03:15
Then we have SSL
03:17
versus TLS accelerators.
03:20
It's a method of offloading processes intensive
03:23
public key encryption for transport layer security, RTL S
03:29
and it's a predecessor to SSL, which again SSL not considered more likely legacy. In other words, to a hardware accelerator.
03:38
An SL decrypt ER is an injury standard for transmitting secure data over the Internet,
03:47
a media gateway. It this, in fact, is a device in the core network of a telecom network operator to provide transformation and inter networking between media screams that use different network standards, communication protocol, Kodak's and as well as physical connection so that the phone calls can
04:05
work properly between the network using different types of technology.
04:10
So, in fact, is the device that translate different media screams, typically on a telephoning network.
04:16
Hotwire Security Module
04:19
This is a physical computing advised that safeguards and managed physical keys for scrum with Indication and also but by crypto processing you well,
04:30
this brings us to our post assessment questions for this particular video and the course. It is as follows
04:35
state specific, that the bridge is a network device that connects to arm or networks together. Is that true or false?
04:46
If you said that you you're absolutely correct,
04:48
this brings us to our key takeaways. From this particular presentation we learned at a branch of the network device that connects two or more networks Together
04:56
we're under that media Gateway is a device that translate different media screen, typically
05:00
on a telephone network.
05:03
We learned it a mail gateway, the device that sends and receives email.
05:09
We also highlight the fact that SSL decrypted is a interest ended for transmitting secure data over the Internet
05:15
and our upcoming video we're taking a look at a brand new section of this particular module. We take a look at 2.2. Given a scenario, you're gonna use appropriate software to to assess the security posture. Often organization
05:30
Look forward to seeing you in a very next video.
Up Next
CompTIA Security+

Interested in the cybersecurity industry? The CompTIA Security+ is the gold standard for those looking to enter the cybersecurity industry. Join thousands of professionals who have gained this certification through this course and launched their careers in information security.

Instructed By