Virtual LANs or VLANs are an important network security control that allow us to logically group together related systems, regardless of where they normally exist on the network. In this video, learn how virtual LANs may be used to segment networks of differing security levels.
- [Instructor] Virtual LANs, or VLANs,…are an important network security control.…VLANs allow us to logically group together…related systems on a network,…regardless of where they normally exist on that network.…When we create diagrams of our desired network layouts,…they typically look something like this,…with different functional groups…having different network locations.…Users in the accounting department all share a network…that is separate from users in the sales department…and those in the IT department.…
If our building and floor layout matched…this network diagram exactly, we'd be all set.…More often than not, however,…we find ourselves in situations…where users from different departments…are mingled together and those departments…are spread across multiple buildings.…That's where virtual LANs come into play.…We can use them to connect people…who are on different parts of the network to each other…and also to separate them from other users…who might actually be geographically close to them.…
Virtual LANs extend the broadcast domain.…
Note: This course is part of a series releasing throughout 2018. A completed learning path of the series will be available once all the courses are released.
- How IP addresses are assigned and managed
- Multilayer protocols
- VPNs and VPN concentrators
- Designing secure networks
- Firewall management techniques
- Maintaining network availability
- Software defined networking (SDN)
- Port isolation
- Network attacks
- How Wi-Fi networks function
- WPA, WPS, and propagation attacks
- Host-based network security control
Skill Level Advanced
Insights from a Cybersecurity Professionalwith Mike Chapple32m 15s Appropriate for all
1. TCP/IP Networking
2. Network Security Devices
3. Designing Secure Networks
4. Specialized Networking
5. Secure Network Management
6. Virtualized Networks
Port isolation1m 47s
7. Network Attacks
8. Transport Encryption
9. Wireless Networking
10. Host Security
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.