Learn how to plan for, install, and administer a network firewall. Explore how firewalls help to secure traffic, and get tips for building a secure network barrier of your own.
- [Narrator] Take a moment to imagine something with me. Your at home, you've had a long business day and you sit down to your computer to get some home stuff done. You know this sort of thing, returning emails, paying bills, maybe listen to a pod cast. You notice that everything on your computer is running incredibly slowly. Over a few days you notice that your computer is only slow when your at home You call for help, your regular I.T. guy has no idea what's wrong. Can't explain it and so calls in a expert. The expert spends some time looking at logs, analyzing your computer and your network equipment logs. He asks to see your security camera DVR and then your home TV DVR and then the wall system panel you used to control your heating and air conditioning and your security cameras. And your home lighting system. that you've been hacked. Not only is your home router passing traffic from a dozen foreign countries hosted on your home security DVR. But literally every internet of things device on your network is at risk of being taken over and should be flashed back to factory defaults. The company that installed the security cameras is so embarrassed they take the DVR back and give you a completely new one. This time with the default admin name The router must be replaced with a more full featured fire wall and you need strong security software installed on your computer at home. Your advised to take the same precautions at work if possible and to talk to your work I.T. department about the experience to determine if your work has been exposed to similar threats. A Threat can be made against any Potential hack or Unpatched software or Hardware exploit or Social hacking technique to gain access to protected data to which they have no claim or right. An Exploit is A vulnerability that is known, documented and may be used by hackers. Hacking is the Act of taking advantage of an exploit and gaining unauthorized access to data. Interestingly, Hacking is not simply accessing data For a Hack to be a Hack there has to overcome a security system to gain access to data. Essentially it's like breaking down a door to get in a house versus walking through an open door. that you don't care if someone enters. Firewalls are all about Locking the door and granting access very specifically both in and out through that door. That metaphor won't be useful beyond this point but it serves to give you the idea here at the beginning. A Firewall is just one type of protection available to data security professionals. But it is the most fundamentally important protection for a network.
- Designing your network
- Creating firewall schedules and rules
- Setting up a virtual IP
- Using aliases to group hosts
- Preventing local traffic from exiting to the internet
- Using Snort and other intrusion detection systems
- Prioritizing VoIP traffic
- Blocking access to specific websites
- Troubleshooting gaming performance issues
- Interpreting TCP flag definitions