Risk mitigation methods
This section discusses network security risk mitigation methods, including technologies, network design, networking protocols, organizational polices, compliance frameworks, and risk assessment
Learning objectives
• Point 1 • Point 2 • Point 3 • Point 4 • Point 5
Risk mitigation methods spanning technologies (firewalls, IDS/IPS, encryption, VPN), network design (segmentation, DMZ, and honeypots), networking protocols (don't use DTP/VTP; use encryption protocols), organizational policies (e.g., usage policies, security policy, privacy policy), compliance frameworks, risk assessment/security testing, professional conduct, and security training.
Topics covered in this section
Point 1
Point 2
Point 3
Point 4
Point 1
Risk mitigation methods spanning technologies (firewalls, IDS/IPS, encryption, VPN), network design (segmentation, DMZ, and honeypots), networking protocols (don't use DTP/VTP; use encryption protocols), organizational policies (e.g., usage policies, security policy, privacy policy), compliance frameworks, risk assessment/security testing, professional conduct, and security training.
Key lesson takeaways
• Point 1 • Point 2 • Point 3 • Point 4
References
Reference
Last updated