Palo Alto Networks网络安全网关 II

Palo Alto Networks Cybersecurity Gateway II

856 次查看
派拓网络
Coursera
  • 完成时间大约为 10 个小时
  • 中级
  • 英语
注:本课程由Coursera和Linkshare共同提供,因开课平台的各种因素变化,以上开课日期仅供参考

课程概况

Cybersecurity Gateway II

Gateway II Course Description
Gateway II provides the student with a full understanding of the fundamental tenants of networking and covers the general concepts involved in maintaining a secure network computing environment. Upon successful completion of this course, students will be able to fully examine, describe general networking fundamentals and implement basic networking configuration techniques.

Gateway II Learning Objectives:
Upon completion of this course, students will be able to:
• Examine cybersecurity landscape environments, attack threat vectors, exposure, vulnerabilities, and risk factors.
• Accurately explain common use of cloud, virtualization, storage, backup, and recovery procedures.
• Apply the knowledge and skills necessary to plan, design, implement, troubleshoot, and maintain network infrastructure environments.

课程大纲

GATEWAY II: MODULE 1 - COURSE INFORMATION

** Gateway II builds on top of the networking fundamentals content that was discovered in Gateway I.** Begin your Gateway II experience here. Carefully evaluate the Course Information and Resources content area and identify the tools and processes you will use in this course.

Gateway II: Module 2 - Cybersecurity Landscape and Threats

The term Cybersecurity Landscape is complex and difficult to define as it is ever changing. In this module security professionals will focus on identifying best practices for assessing and mitigating network vulnerabilities and their associated threats.

Gateway II: Module 3 - Cloud, Virtualization and Storage Security

Terms like 'redundancy', 'scalability', 'availability' and 'trust' are commonly used when describing either Cloud, Virtualization or Storage environments. Module 3 helps students apply those terms in specific relationships with cloud components, cloud connectivity, virtual services and storage management.

Gateway II: Module 4 - Networking Concepts and Principles

Networking and Security best practices often go hand in hand. You always begin by inventorying your resources and assets and identifying their vulnerabilities. Then you can apply appropriate measures to limit the threats that could exploit those vulnerabilities. In this module students will analyze different network appliances and define the troubleshooting measures that can be used to identify and remedy risks and vulnerabilities.

千万首歌曲。全无广告干扰。
此外,您还能在所有设备上欣赏您的整个音乐资料库。免费畅听 3 个月,之后每月只需 ¥10.00。
Apple 广告
声明:MOOC中国十分重视知识产权问题,我们发布之课程均源自下列机构,版权均归其所有,本站仅作报道收录并尊重其著作权益。感谢他们对MOOC事业做出的贡献!
  • Coursera
  • edX
  • OpenLearning
  • FutureLearn
  • iversity
  • Udacity
  • NovoEd
  • Canvas
  • Open2Study
  • Google
  • ewant
  • FUN
  • IOC-Athlete-MOOC
  • World-Science-U
  • Codecademy
  • CourseSites
  • opencourseworld
  • ShareCourse
  • gacco
  • MiriadaX
  • JANUX
  • openhpi
  • Stanford-Open-Edx
  • 网易云课堂
  • 中国大学MOOC
  • 学堂在线
  • 顶你学堂
  • 华文慕课
  • 好大学在线CnMooc
  • (部分课程由Coursera、Udemy、Linkshare共同提供)

© 2008-2020 CMOOC.COM 慕课改变你,你改变世界