greetings and welcome back to Siberia is Cop Tear Certified Van Secluded Practitioners Certification Preparation course. This is, in fact, a continuation of Marginal at seven, which is titled Network Security Architecture
Here. Get on the objectives, which encompasses this particular module.
Let's not turn out to your discussion of the key take away from this particular model, which is titled Network Security Fundamentals.
Now for the key takeaways from this particular module
we learned about standing, there were security devices and how they provide a degree of security.
We thought we looked at the router. The switch, the low bannister was a proxy
we learned and, in fact discussed hardware device specifically designed for security. We learned that they give a higher level of protection
in terms of the hardware based firewalls and Web application firewalls.
Virtual private networks we learned today uses unsecure public network and encryption to, in fact, provide security.
The intrusion detection system, designed to detect attack as it occurs, met where technology can help secure your network from regarding network address translation that were access control. We look at the methods for designing a security and we're bringing from the D. M Z or perimeter and also a virtual private network.
And lastly, the D M Z, often referred to as your perimeter network
and our upcoming presentation. We were moving on, and I next module will just title Martyr eight Secure Network configurations, and I look forward to seeing the very next video.