Module 2: Proactive Defence and Countermeasures
Introduction to Security
- Network Security Challenges
- Elements of Information Security
- Security, Functionality and Usability Triangle
- Zero Trust approach
- Castle Moat approach
Firewall
- What is a Firewall
- Types of Firewall
- Designing network security with Firewall
- Secure Access Service Edge (SASE)
- NAT
- Security Policy
- Logs Management
- Application Security
- Content / Web Security
- Authentication
Virtual Private Networks
- What is VPN
- Type of VPNs
- GRE
- IPSEC
- SSL
Intrusion Prevention Systems
- What is an Intrusion Detection System
- What is an Intrusion Prevention System
Unified Threat Management
- What is UTM
- How UTM is different from Firewall
- Advantages of UTM