From the course: CCNA Cybersecurity (200-201) v1.2 Cert Prep
Unlock this course with a free trial
Join today to access over 25,300 courses taught by industry experts.
Data visibility comparison
From the course: CCNA Cybersecurity (200-201) v1.2 Cert Prep
Data visibility comparison
(gentle music) - [Instructor] In our previous module, we discussed data visibility, and that was our ability to monitor and track data flowing through our network. And in this lesson, I want to take a look at some specific technologies and compare how those technologies that we see on screen affect our ability to observe this data in transit. Let's get started by taking a look at ACLs or access control lists. We could think of ACLs much like security checkpoints. They allow us to clearly see and decide what traffic is allowed and not allowed to pass a certain point in the network, typically on a router interface. And this limiting of traffic actually enhances our data visibility because we're looking at very specific allowed data rather than everything. So ACLs, that's going to improve our visibility. Next up, let's consider network address translation and port address translation. Similar technologies. It all goes back to the fact that we are out of publicly routable IP version four…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
(Locked)
Module 2: Threat detection and surveillance1m 13s
-
(Locked)
Attack surfaces1m 53s
-
(Locked)
Monitoring sources7m 8s
-
(Locked)
Data visibility comparison6m 25s
-
(Locked)
Categories of data types2m 54s
-
(Locked)
Denial-of-service (DoS) attacks5m 43s
-
Man-in-the-middle attacks9m 39s
-
(Locked)
Protocol-based attacks8m 12s
-
(Locked)
SQL injection attacks7m 25s
-
(Locked)
Cross-site scripting attacks5m 19s
-
(Locked)
Command injection attacks1m 26s
-
(Locked)
Social engineering attacks7m 43s
-
(Locked)
AI-based social engineering attacks2m 7s
-
(Locked)
Malware and ransomware attacks4m 22s
-
(Locked)
Buffer overflow attacks1m 49s
-
(Locked)
Command-and-control (C2) attacks2m 11s
-
(Locked)
Comparison of obfuscation techniques2m 3s
-
(Locked)
Encryption with digital certificates4m 21s
-
(Locked)
Digital certificate components7m 4s
-
(Locked)
-
-
-
-
-