Proxy servers make and handle requests on behalf of clients and servers. In this video, Mike Chapple explains the functioning of forward proxies, reverse proxies, transparent proxies, and multipurpose proxy servers.
- [Instructor] Proxy servers are specialized servers…that browse websites on behalf of end users.…They serve as proxies, or intermediaries, that prevent…users from directly connecting to websites.…Normally, when a user connects to a website,…the user system is in direct contact with the server,…sending information back and forth.…In a proxy situation, the proxy server sits…in the middle of the connection.…The user connects to the proxy server…and the proxy server connects to the web server.…
All traffic then passes through the proxy server.…This has three important security benefits.…First, proxying provides anonymity.…The web server never learns the network address…of the actual user.…Its logs only contain the address of the proxy server.…Second, proxying provides performance benefits…by caching.…The proxy server can store copies…of frequently requested pages and answer some user requests…with those stored or cached copies,…reducing the demand for network bandwidth.…
Finally, proxy servers can perform security tests,…
Author
Released
10/10/2017We are a CompTIA Partner. As such, we are able to offer CompTIA exam vouchers at a 10% discount. For more information on how to obtain this discount, please download these PDF instructions.
- IP addresses
- ICMP
- Routers, switches, and bridges
- Firewalls
- VPNs and VPN concentrators
- Network intrusion detection and prevention
- Managing secure networks
- Tuning and configuring SIEMs
- Troubleshooting digital certificates
- Personnel, host, and mobile device security
- Mobile device management and tracking
- Securing common protocols
Skill Level Beginner
Duration
Views
Related Courses
-
Insights from a Cybersecurity Professional
with Mike Chapple32m 15s Intermediate
-
Introduction
-
Welcome1m 37s
-
-
1. TCP/IP Suite
-
Introducing TCP/IP5m 20s
-
IP addresses3m 26s
-
Domain name service4m 6s
-
Network ports3m 42s
-
ICMP3m 29s
-
-
2. Network Security Devices
-
Firewalls4m 17s
-
Proxies3m 3s
-
Load balancers4m 44s
-
VPNs and VPN concentrators4m 43s
-
IPsec3m 17s
-
Unified threat management1m 57s
-
OpenID Connect3m 24s
-
3. Managing Secure Networks
-
Firewall rule management4m 41s
-
Network monitoring4m 19s
-
SNMP3m 18s
-
Storage networks3m 8s
-
-
4. Wireless Networking
-
Wireless networking3m 50s
-
Basic wireless security3m 45s
-
WEP, WPA, and WPA21m 44s
-
Wireless authentication5m 7s
-
Wireless signal propagation2m 47s
-
-
5. Security and Monitoring Technologies
-
Tuning and configuring SIEMs3m 49s
-
Data loss prevention7m 4s
-
Network access control5m 34s
-
Mail gateways3m 7s
-
Data sanitization tools4m 11s
-
Steganography4m 55s
-
6. Security Assessment Tools
-
Protocol analyzers9m 17s
-
Network scanning7m 15s
-
Exploitation frameworks7m 14s
-
Command line network tools14m 50s
-
DNS harvesting5m 23s
-
-
7. Security Troubleshooting
-
8. Personnel Security
-
Personnel security3m 7s
-
Employee termination process2m 42s
-
Employee privacy2m 23s
-
Social networking3m 52s
-
Personnel safety2m 31s
-
-
9. Host Security
-
Operating system security9m 22s
-
Malware prevention10m 25s
-
Application management6m 38s
-
File integrity monitoring6m 46s
-
Removable media control3m 42s
-
Data execution prevention2m 17s
-
-
10. Mobile Device Security
-
Mobile connection methods4m 39s
-
Mobile device security2m 35s
-
Mobile device management7m 7s
-
Mobile device tracking3m 28s
-
Mobile application security5m 31s
-
Mobile security enforcement4m 14s
-
Bring your own device4m 47s
-
Mobile deployment models3m 31s
-
-
11. Securing Protocols
-
TLS and SSL4m 1s
-
Securing common protocols6m 30s
-
Cryptographic hardware4m 8s
-
-
Conclusion
-
Next steps37s
-
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: Proxies