Technology Intro

Video Activity

In this lesson, instructor Kelly Handerhan will introduce you module 6; covering the actual information security technology itself. Main points covered will include: The CISO does not need to be a technical expert in order to perform the CISO role competently The CISO does need the ability to intelligently understand and discuss current technologie...

Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
3 hours 54 minutes
Difficulty
Advanced
Video Description

In this lesson, instructor Kelly Handerhan will introduce you module 6; covering the actual information security technology itself. Main points covered will include:

  • The CISO does not need to be a technical expert in order to perform the CISO role competently

  • The CISO does need the ability to intelligently understand and discuss current technologies

  • Being technically savvy increases both the competency, and the perceived competency of the CISO

  • A technical skillset helps the CISO bridge the gap between the technicians and executive management

You will also receive an overview of secure network design concepts: - Separation of trust

  • Firewalls

  • VLANS

  • NAT

  • Single Sign On

  • Configuration management

Video Transcription
00:04
okay. As we continue to move on, we're gonna look at Module six, which is looking at the actual technology itself, the information security technology. Now, as far as this goes from a technical perspective, the scissor does not need to be a technology expert.
00:21
As a matter of fact, many chief information security officers
00:24
have been removed from the technical aspect of the job for quite a while. They've been in management, whether it's project management, whether they've been lied technicians, they've been strategists or architects or whatever that may be. Many scissors haven't had their hands on in
00:42
quite a while
00:45
expert in the technical elements, especially the newer technologies. But in the principles of secure design and secure structure and architecture, they absolutely must be well versed. So they've got to be able to understand and discuss current technologies.
01:03
That really is the understanding of the concepts underneath. And, you know, there's a phrase that I particularly like and the phrases that security transcends technology.
01:15
Security transcends technology, and ultimately, what that comes down to is in order to secure an organization, you need a lot more than gadgets in place. You need a foundational understanding of the importance of security, unique
01:32
good security principles that are in place, like separation of Judy's.
01:36
Isolating, trusted from untrusted networks, the cost benefit analysis. You need those elements in place, and those really transcend whatever. The latest greatest firewall is, for example, so always focus on security principles,
01:53
and that's what a scissor really has to have an understanding of.
01:57
All right, so speaking on these principles or speaking of these principles, there's some concepts of secure network design that we really want to talk about, and then we'll go into each of these a little bit more in depth. The 1st 1 is separation of trust by isolating trusted networks from untrusted networks.
02:17
Many times we use firewalls to create that separation.
02:23
We can also use the lands or routers that provide that segmentation that isolation. Often these devices will firm perform network address translation things. They're all security concepts will get into deeper
02:38
as well as single sign own, which helps us control access to the main environment
02:43
and then finally will wrap up with the importance of configuration management
Up Next