Join Mike Chapple for an in-depth discussion in this video Security device placement, part of SSCP Cert Prep: 6 Networks and Communications Security.
- [Narrator] Security architects are not only responsible…for selecting appropriate security controls,…but they also must determine the best locations…to place those controls on the network.…We've already talked about how network architects…use firewalls to divide networks into security zones.…It's appropriate to place a firewall…at any point in the network where you would like…to enforce a network security boundary.…In this example, the firewall sits at the network boarder…separating an internal network…and the DMZ from the internet.…
There could easily be additional firewalls…on the internal network.…For example, we might place a firewall here…to enforce separation between the N point network,…wireless network, guest network, and data center network.…The exact placement of firewalls…will depend upon your organization's security…and business requirements.…Many security controls are designed…to collect information from network segments.…These include the sensors associated with intrusion,…detection, and prevention systems,…
To join one of Mike's free study groups for access to bonus tips and practice questions, visit certmike.com.
- TCP/IP networking
- Network security devices
- Switches and routers
- Content distribution networks
- Storage networks
- Securing networks
- Network attacks
- Wireless networking and security
Skill Level Intermediate
Q: This course was updated on 07/27/2018. What changed?
A: New videos were added that cover network relationships and security device placement.
IT Security Careers and Certifications: First Stepswith Marc Menninger2h 6m Appropriate for all
IT Security Foundations: Core Conceptswith Lisa Bock1h 13m Beginner
Insights from a Cybersecurity Professionalwith Mike Chapple32m 15s Appropriate for all
1. TCP/IP Networking
2. Network Security Devices
3. Designing Secure Networks
4. Specialized Networking
5. Secure Network Management
6. Network Attacks
7. Wireless Networking
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.