Time
10 hours 32 minutes
Difficulty
Beginner
CEU/CPE
11

Video Transcription

00:00
Welcome to Cyber is Video Siris on the Comp. Tia Security Plus 5 +01 Certification and Exam.
00:07
I'm your Instructor, Round Warner
00:10
in this video a Review section 3.2.
00:14
Given a scenario, implement Secure Network Architecture Concepts.
00:19
This section goes very much with a lot of the topics covered in the second domain.
00:25
In this video, we'll cover the following concept
00:28
zones and apologies,
00:31
network segmentation and isolation.
00:35
Different security devices you'll find on the network. Such a sensors. Collectors, filters, proxies and firewalls.
00:42
Intrusion detection and protection systems.
00:45
Tunneling and VPN
00:48
software defined networks and honey pots and honey nets.
00:53
Network design and it's included. Components play an important role and implementing the overall security of an organization.
01:02
An overall security solution includes design elements such a zones and apologies that distinguished private networks, Internet and the Internet.
01:12
This topic. You should understand the different types of zones and and apologies
01:18
they're seeing on a standard corporate network.
01:22
Each zone on the network is separated based on the organizational roll or level of security. For example, you might want to separate your accounting from your manufacturing, and you can do that at the network layer layer
01:36
For example, there are security zones, general work zones and low security zones. So security zone are the is the most sensitive data
01:46
with payment card industry. It's No. One has the cardholder data environment. C d e. It's a secure zone normally separated on the network.
01:55
A general work zone, maybe four year general administrator
02:00
purposes. Then low security zones will be before more public level. Access
02:06
the different types of zones. You'll see that our standard is a D M Z or D demilitarized zone. Talk more about that in a moment.
02:15
Extra Net and Internet
02:16
wireless That maybe guest access.
02:21
A demilitarized Zone Hunter Network Where D. M Z is a small network between the internal network and the Internet. External networks and it provides a layer of security and privacy. Both internal and external E users might have limited access to systems and servers within the D M Z.
02:40
For example, Web or mail servers are often placed in the D. M Z because these devices are exposed to the Internet,
02:47
but they also need to be access from the inside network.
02:52
The D M Z allowed external users to access information that the organization deems necessary
02:58
but will not compromise any internal organizational information.
03:02
You see an example of a D M Z on your screen, and you could see how it provides this buffer zone and defence in depth,
03:10
and it's usually set up using multiple firewalls.
03:14
Keen Mind D M Z concepts are a little bit dated, and not it's applicable in today's cloud architectures.
03:21
In addition to a D M Z, many organizations have an intranet and an extra net.
03:27
An extra Net is a private network that uses Internet technology so across the Internet and public telecom
03:35
to securely share business information and or operations with suppliers, vendors, partners, customers.
03:42
Intranet is all internal to the company. It's like having your own private Web server solely within the organizational framework.
03:52
We talked about wireless in other videos
03:54
for section 3.2, you need to be familiar with wireless segmentation. How do you separate out WiFi?
04:01
Because WiFi tends to have a higher risk associated with it.
04:06
The idea is on the network layer separating wireless on an internal network, creating the buffer between wireless and wired networks,
04:15
also separating out guest wireless access from internal networks.
04:18
This is controlled using 801.1 export based access control,
04:26
which I talk about in depth in another video.
04:29
Another way to segment Wireless is using Mac filtering.
04:34
A Mac definition is available on your screen media access Control restricting access on Y If I based on the Nick Network Interface Card address,
04:46
keep in mind there's many other ways to segment wireless networks. Use for just a few to keep in mind for security. Plus
04:54
Section 2.1
04:56
also talks about security devices.
04:59
But for this section, be aware of where you will place these types of security devices on a network.
05:04
Your firewalls were unified threat management systems. Normally, they will be placed on the border of your network between the internal network and your Internet.
05:16
You may also have an intrusion detection system within that border area. You could also have ideas and I ps on internal network segments.
05:27
A virtual private network allows for remote access. Talk more about VP ends in a while.
05:33
A proxy
05:35
goes in between internal users and external websites.
05:41
A load balancer you might have to Web servers, and you want to balance the load between them that way. One doesn't get to over bird.
05:50
It goes between the two is what a load balancer will do.
05:55
A security incident. Invent management system is a lot correlation system.
06:00
What brings together logs from multiple systems in tow? One place where then can be correlated easily monitored and reviewed.
06:10
Last concept is your di das distributed denial of service mitigation. This will also be placed within your border. Router may also have a service that does Diaz mitigation for your organization.
06:26
There are multiple rules to a firewall.
06:28
The firewall functions are listed on your screen. First is your packet filter basically your I P filtering or port filtering
06:36
proxy firewall, mostly for applications or Web access.
06:42
And then state full packet inspection looks into the network packets to make sure that they're not malicious. You can see on your screen typical placement for firewall between the Internet
06:55
and the D. M Z.
06:57
Some firewalls are known as dual homed fireballs. They have to network interface cards
07:02
one to the external network, one to the internal network.
07:06
A firewall may also provide network address translation.
07:12
Translating an external I P address one that is used internally,
07:16
often with a firewall, is an intrusion detection or intrusion protection system. I D. S I. P s
07:25
may also refer to these refer to as and needs or nips network intrusion or network protection systems.
07:32
These air sensors that collect data
07:35
detecting there we are detecting whether there could be a potential intrusion across the network. They react to detect it events. Traffic outside of normal bounds you have to
07:47
detect for anomalies
07:49
might be signature or behavioral based
07:53
or could be using Curis sticks. Basically a model for normal behavior. A typical needs consists of sensors to monitor packet traffic, a server for management functions and a management console.
08:07
Can all of these often be included with a firewall and placed at the border of the network?
08:13
Proper network design is important to ensure that the network is stable, reliable, scalable and secure.
08:20
The network should be segmented to separate information and infrastructure based on organizational needs and requirements.
08:28
The lands are a logical separation of a physical network.
08:33
Atlanta is basically a software solution that supports creating unique tagged, identify IRS to be assigned to different ports on the switch
08:43
to secure a virtualized environment machine should be segmented by the sensitivity of the information they contain the second method for segregation on a network using different virtual machines.
08:56
The third is Air Gaps, which is a physical separation, keeping them on completely different networks. They're not attached by any network.
09:05
These were all different forms of network Secord, segmentation and segregation.
09:11
Previously, I spoke about a villain, virtual local area network.
09:18
You see on your screen an example of a villain, and it's all done through software on a switch. Example on your screen shows a different segment for management
09:28
voice over i p maybe cameras. Villains provide a way to limit broadcast traffic in a switch network.
09:35
This creates a boundary and, in essence, creates multiple isolated lands. On one switch,
09:43
one host in one V land need to communicate with hosting another villain that traffic must be routed between them.
09:50
This is called interval and routing.
09:52
When a layer to or data link layer switches. Used router is required to pass the traffic from one V land to another.
10:01
When a layer three or network layers, which is used interview land routing is done through Layer three. Interface is the most notable benefit of using a villain. Is that conspire and multiple switches. Because users on the same villain did not have to be associated by physical location,
10:20
they could be grouped logically.
10:22
Another concept to be familiar with is VP ends and cuddling using virtual private networks, and this is normally placed at the border of your network. It's a private network connection through unsecured public networks, and it's used to connect
10:39
land.
10:39
Remote devices appear as if they are local.
10:43
They're multiple methods associated with VP ends on his site to site where you're connecting, maybe another business to your organization across the Internet, so connecting those lands
10:56
another is remote access. This is what you might be familiar with with either an SSL or I p SEC VPN. It connects end users or devices to the corporate network.
11:09
The third type are remote access servers, allowing remote access from external internal networks.
11:18
C Section two dot want for more information on VP Ends.
11:22
A software to find network is an entirely virtualized network allows for easier network segmentation. So it's all done logically across multiple physical switches or routers.
11:37
That allows administrators to place virtualized security devices
11:41
anywhere a lot more flexibility, therefore, allowing a lot more security.
11:46
The SD and architecture is directly programmable.
11:50
It's agile, very configurable, centrally managed. You don't need to go to separate switches, all done within a single interface.
12:01
Programmatically configured so basically easier to configure for your network or security administrator.
12:07
And it's based on open standards tends to be vendor neutral.
12:11
Be familiar with software to find networks is they're used by many organizations
12:18
honey pots and honey nets,
12:20
our systems or networks meant to be breached. They are developed and exposed to capture malicious activity.
12:28
They are left vulnerable on purpose and may be part of an investigation or to study attack strategies.
12:37
You want to make sure that if you are using a honey pot or honey net that it's separate from any business network.
12:43
Honey d dot org's is a sight I recommend to learn more about honey pots and honey nets.
12:50
Let's practice on some sample quiz questions.
12:54
Question one. Alice is a C. I. S O for a financial institution.
12:58
She wants to use a device that is it intentionally broken to catch and log potential attacks.
13:05
The answer is a
13:07
Honey Pots
13:09
question, too.
13:11
Alice hired you as her network architect.
13:13
She wants a file transfer server in an area that's accessible from both the Internet
13:18
and to internal users.
13:22
What's your best approach?
13:24
The answer is D.
13:26
Place the server in a D m Z
13:28
separate network, accessible from both the Internet and your internal network.
13:35
There are many labs. Associate it with the concepts in section 3.2.
13:39
1st 1 is the firewall rules based management lab.
13:45
Second lap or is the Firewalls and Evasion
13:48
Lab where you practice connecting to a hyper V manager. You install zone alarm firewall and anti virus and configure it as a firewall.
13:58
Another lap for you to consider is the one where you're configuring an I. D. S and honey pots. The last lab associated with this section is implementing a network policy server.
14:09
Re practice, creating and managing a VPN server and client and viewing the logs.
14:18
This concludes section 3.2.
14:20
Given a scenario, implement secure network architecture concepts. We talked through numerous concepts. Associate it with the placement of security devices within a network.
14:31
Please refer to your study material for more information on this section,

Up Next

CompTIA Security+

CompTIA Security Plus certification is a great place to start learning IT or cybersecurity. Take advantage of Cybrary's free Security+ training.

Instructed By

Instructor Profile Image
Ron Woerner
CEO, President, Chief Consultant at RWX Security Solutions LLC
Instructor