Content distribution networks, or CDNs, provide organizations who might experience a high volume of web traffic from around the world a way to satisfy that demand without building out massive web infrastructures. They also provide advanced security features that can protect web environments from many types of attacks. In this video, learn how CDNs function and the security advantages they can offer.
- [Instructor] Content distribution networks…provide organizations who might experience…a high volume of web traffic from around the world…a way to satisfy that demand…without building out massive web infrastructures.…CDNs also provide advanced security features…that can protect web environments from many types of attack.…One quick note on terminology.…Everyone agrees that this technology…goes by the acronym CDN, but people differ…on what the D stands for.…Most technologists describe CDNs…as content delivery networks.…
The CISSP Body of Knowledge describes them…as content distribution networks,…so I'll use that term in this course.…It's mostly just a matter of semantics,…but you should be aware that both CDNs are the same thing.…When organizations expect a high volume of web traffic…to their servers, the natural response…is to simply increase the capacity of their web server farm…by adding more servers to meet additional demand.…This can quickly become a cat and mouse game…as usage increases, creating demand for even more servers.…
Note: This course is part of a series releasing throughout 2018. A completed learning path of the series will be available once all the courses are released.
- How IP addresses are assigned and managed
- Multilayer protocols
- VPNs and VPN concentrators
- Designing secure networks
- Firewall management techniques
- Maintaining network availability
- Software defined networking (SDN)
- Port isolation
- Network attacks
- How Wi-Fi networks function
- WPA, WPS, and propagation attacks
- Host-based network security control
Skill Level Advanced
Insights from a Cybersecurity Professionalwith Mike Chapple32m 15s Appropriate for all
1. TCP/IP Networking
2. Network Security Devices
3. Designing Secure Networks
4. Specialized Networking
5. Secure Network Management
6. Virtualized Networks
Port isolation1m 47s
7. Network Attacks
8. Transport Encryption
9. Wireless Networking
10. Host Security
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.