From the course: CCSP Cert Prep: 5 Cloud Security Operations Audio Review
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Network security
From the course: CCSP Cert Prep: 5 Cloud Security Operations Audio Review
Network security
- [Instructor] We need to design security controls to protect the confidentiality, integrity, and availability of the systems and information that use our networks. In Chapter 4 of the course, I discussed network security controls. Chief among these is the firewall. Firewalls are the foundation of network security. They provide our perimeter defense and allow us to create segmented networks. The primary purpose of a firewall is to control access to a network. They sit in between two, three, or more networks, and decide what can be allowed to pass in between those networks. We specify what's allowed to pass through a firewall by writing firewall rules that define what type of network traffic is allowed. Chief among these is the implicit deny rule. This rule says that any traffic that is not explicitly allowed by another firewall rule is automatically denied. Now in the cloud, we can't usually directly control the…
Contents
-
-
-
(Locked)
Physical and logical infrastructure2m 54s
-
(Locked)
Physical and logical infrastructure: Q&A2m
-
(Locked)
Secure infrastructure operations2m 50s
-
(Locked)
Secure infrastructure operations: Q&A1m 18s
-
(Locked)
Network operations2m 36s
-
(Locked)
Network operations: Q&A1m 11s
-
(Locked)
Network security2m 28s
-
(Locked)
Network security: Q&A1m 51s
-
(Locked)
Security baselines and standards2m 32s
-
(Locked)
Security baselines and standards: Q&A1m 39s
-
(Locked)
Monitoring2m 11s
-
(Locked)
Monitoring: Q&A1m 37s
-
(Locked)
Threat assessment2m 10s
-
(Locked)
Threat assessment: Q&A1m 35s
-
(Locked)
Incident management1m 47s
-
(Locked)
Incident management: Q&A1m 23s
-
(Locked)
Investigations and forensics1m 51s
-
(Locked)
Investigations and forensics: Q&A1m 25s
-
(Locked)
-