From the course: CCNA Cybersecurity (200-201) v1.2 Cert Prep
Unlock this course with a free trial
Join today to access over 25,500 courses taught by industry experts.
Application security solutions
From the course: CCNA Cybersecurity (200-201) v1.2 Cert Prep
Application security solutions
- [Narrator] Yet another layer of security that we can implement as part of our Cisco defense in-depth strategy is to secure our applications. And in this video, we'll consider a few options for application security, including a web application firewall, Identity and Access Management or IAM, and a couple of Cisco solutions including Cisco Secure Email Gateway and Cisco Secure Web Appliance. But let's begin by considering a web application firewall. One thing this can do for us is help protect against a denial of service attack. Maybe a malicious user is flooding a web server with all these HTTP requests in an attempt to overwhelm that web server. Well, this web application firewall has the ability to rate limit those incoming requests. So the web server does not succumb to this denial of service attack. It can also help protect us from cross site scripting or a CSS attack. And later in the course we'll identify exactly what a cross site scripting attack is all about. But for now, I…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
(Locked)
Module 1: Foundations of digital defense1m 14s
-
(Locked)
Cybersecurity defined3m 50s
-
(Locked)
The CIA triad4m 11s
-
(Locked)
Vulnerabilities, threats, exploits, and risks2m 24s
-
(Locked)
Cybersecurity terminology4m 36s
-
Defense in depth8m 43s
-
(Locked)
Network security solutions10m 25s
-
(Locked)
Endpoint security solutions5m 15s
-
(Locked)
Application security solutions3m 45s
-
(Locked)
Agent-based vs. agentless security solutions7m 38s
-
(Locked)
SIEM and SOAR5m 28s
-
(Locked)
Virtualized solutions7m 45s
-
(Locked)
Cloud-based solutions4m 38s
-
(Locked)
Access control model options5m 58s
-
(Locked)
Common Vulnerability Scoring System (CVSS)4m 49s
-
(Locked)
Data visibility considerations2m 8s
-
(Locked)
Data loss analysis2m 17s
-
(Locked)
The 5-tuple approach3m 46s
-
(Locked)
Detection methods3m 25s
-
(Locked)
-
-
-
-
-
-