Module 5 Conclusion

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *

Already have an account? Sign In »

3 hours 20 minutes
Video Transcription
Hello, everyone. My name is Peter Sip alone. And this is the network Security course. This is going to be the conclusion. Video off module Five
prerequisites for this course are modules one through four and lessons one and two from module five. If you have not seen lessons one or two yet, I encourage you to pauses video right here and go back and watch those lessons.
So what? What we learned in this module? Well, we took a look at malware and practical defense is we were in the basics off malware and how not everything is a virus, but rather viruses, worms, route kids and logic bombs
that we took a look at user awareness and cyber practices. This is things like good password management being able to recognize, ah, spoofing email or fishing website and basically things things like that. And we have to go get some security products would back us up in case
human beings falter. So we took a look at firewalls, some honey pots
and proxy servers.
We also took a look at network documentation and the network lifecycle. We examine policies, guidelines and baselines and how, when combined together, they represent good security practices. We took a look at
change management, which restricts unauthorized changes to the network and to make sure any changes to the network
are safe and secure. We took a look at Patch management and how Patch Management updates networks and fixes security issues and vulnerabilities. And we took a look at the network development life cycle,
which is the process of analyzing and making changes to the network again and again as many times as necessary.
So now it's time for a little bit of lessons from the feel. I want to talk about the Equifax data breach.
This was the one of the biggest data breaches out there is very recent one as well. 148 million Americans had their information stolen. That's about half the population of the United States.
Attackers were inside Equifax for approximately 76 days, and the cause an unpatched vulnerability and out of date systems. Now, the worst part
about this data breach is the fact that this one of all the other ones you've seen
could have been easily prevented.
The hackers got in because of an unpatched vulnerability.
This book, the ulnar ability, went unpatched and the patch was available. The patch and may have been made available for 3 to 4 months before anyone realized that the hackers were inside this system.
The Equifax organization did not use patch management skills. They did not have God patch management skills at all because there was a Pash that was available. And this vulnerability wasn't picked up when searching for the network. The pan the patch wasn't applied, even though they were aware of this vulnerability.
There's also had some out of date systems in their organization, and they didn't use the network lifecycle appropriately to get those systems back up to date.
I hope you guys learned a lot in this module, and I will see next time.
Up Next