Time
3 hours 20 minutes
Difficulty
Beginner
CEU/CPE
4

Video Transcription

00:02
Hello, everyone. My name is Peter Sip alone. And this is the network Security course. This is going to be the conclusion. Video off module Five
00:13
prerequisites for this course are modules one through four and lessons one and two from module five. If you have not seen lessons one or two yet, I encourage you to pauses video right here and go back and watch those lessons.
00:31
So what? What we learned in this module? Well, we took a look at malware and practical defense is we were in the basics off malware and how not everything is a virus, but rather viruses, worms, route kids and logic bombs
00:48
that we took a look at user awareness and cyber practices. This is things like good password management being able to recognize, ah, spoofing email or fishing website and basically things things like that. And we have to go get some security products would back us up in case
01:07
human beings falter. So we took a look at firewalls, some honey pots
01:11
and proxy servers.
01:15
We also took a look at network documentation and the network lifecycle. We examine policies, guidelines and baselines and how, when combined together, they represent good security practices. We took a look at
01:29
change management, which restricts unauthorized changes to the network and to make sure any changes to the network
01:37
are safe and secure. We took a look at Patch management and how Patch Management updates networks and fixes security issues and vulnerabilities. And we took a look at the network development life cycle,
01:51
which is the process of analyzing and making changes to the network again and again as many times as necessary.
01:59
So now it's time for a little bit of lessons from the feel. I want to talk about the Equifax data breach.
02:07
This was the one of the biggest data breaches out there is very recent one as well. 148 million Americans had their information stolen. That's about half the population of the United States.
02:21
Attackers were inside Equifax for approximately 76 days, and the cause an unpatched vulnerability and out of date systems. Now, the worst part
02:35
about this data breach is the fact that this one of all the other ones you've seen
02:39
could have been easily prevented.
02:43
The hackers got in because of an unpatched vulnerability.
02:47
This book, the ulnar ability, went unpatched and the patch was available. The patch and may have been made available for 3 to 4 months before anyone realized that the hackers were inside this system.
03:02
The Equifax organization did not use patch management skills. They did not have God patch management skills at all because there was a Pash that was available. And this vulnerability wasn't picked up when searching for the network. The pan the patch wasn't applied, even though they were aware of this vulnerability.
03:22
There's also had some out of date systems in their organization, and they didn't use the network lifecycle appropriately to get those systems back up to date.
03:31
I hope you guys learned a lot in this module, and I will see next time.

Up Next

Cyber Network Security

In the Cyber Network Security course, students will get an overview of key principles of cybersecurity and learn about different threats, regulations, and cybersecurity ethical considerations.

Instructed By

Instructor Profile Image
Pete Cipolone
Cyber Security Analyst and Programmer
Instructor