Email is one of the most common vectors for security threats. Phishing messages often serve as the first volley of an advanced threat and email attachments are a frequent source of accidental data loss. In this video, learn how many organizations are turn
- [Narrator] Email is one of the most common vectors…for security threats.…Phishing messages often serve as the first volley…of an advanced threat,…and email attachments are a frequent source…of accidental data loss.…For this reason,…many organizations are turning to secure mail gateways…to secure their use of email.…Secure mail gateways sit in between…email users and the broader internet.…In technical terms, they act as the SMTP server…that first receives mail for an organization…from the outside world…before relaying it to the actual mail servers.…
They also serve as an SMTP relay…for messages leaving the organization.…This unique position on the network allows them…to intercept and scan messages for security reasons…before deciding whether and how to pass them on.…When a Mail Gateway scans a message,…it may to decide to take one of four actions…based upon the content of that message…and the organization's security policy.…First, it may decide that the message…meets the organization's security policy,…and allow it to proceed to its destination.…
- IP addresses
- Routers, switches, and bridges
- VPNs and VPN concentrators
- Network intrusion detection and prevention
- Managing secure networks
- Tuning and configuring SIEMs
- Troubleshooting digital certificates
- Personnel, host, and mobile device security
- Mobile device management and tracking
- Securing common protocols
Skill Level Beginner
IT Security Foundations: Core Conceptswith Lisa Bock1h 13m Beginner
Insights from a Cybersecurity Professionalwith Mike Chapple32m 15s Intermediate
1. TCP/IP Suite
2. Network Security Devices
3. Managing Secure Networks
4. Wireless Networking
5. Security and Monitoring Technologies
6. Security Assessment Tools
7. Security Troubleshooting
8. Personnel Security
9. Host Security
10. Mobile Device Security
11. Securing Protocols
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.