Professional Documents
Culture Documents
Network Security: Teachapex
Network Security: Teachapex
Network Security
Module 02: Network Design Elements
and Components
Course Objectives
○ DMZ ○ NAC
○ VLAN ○ Virtualization
○ Subnetting ○ Cloud Computing
○ NAT ○ iOT
○ Remote Access A network design & the network components
○ Layered security / Defense in depth play an important role in implementing the
○ Telephony overall security of an organization. The
objective of this course is to learn network
components such as DMZ, VLANs, and
perimeter network boundaries that distinguish
between private networks, intranets, and the
Internet.
TeachApex
2
Network Security
Network Design
Elements and
Components –
Part 1
TeachApex
3
Network Security
DMZ (Demilitarized
Zone)
TeachApex
4
Network Security
VLAN (Virtual Local
Area Network)
TeachApex
5
Network Security
Subnetting
TeachApex
6
Network Security
Network Design
Elements and
Components –
Part 2
TeachApex
7
Network Security
NAT (Network Address Translation)
TeachApex
8
Network Security
Types of Network Address Translation (NAT)
TeachApex
9
Network Security
RAS (Remote Access
Services)
RAS allows remote clients to connect through
a telephone line or other wide area network
(WAN) link to the RAS server.
TeachApex
10
Network Security
Telephony
○ A technology which allows voice and/or interactive ○ When it comes to security, telephony services have
communication between two points through the to be protected in the same way as other network
usage of appropriate equipment. services.
TeachApex
11
Network Security
NAC (Network Access
Control)
A security solution that enforces policy on
devices that access networks to increase
network visibility and reduce risk.
TeachApex
12
Network Security
General Capabilities of a NAC Solution
TeachApex
13
Network Security
Types of Network Access Control
Agent-Based Agentless
Network Access Network Access
Control Control
TeachApex
14
Network Security
Network Design
Elements and
Components –
Part 3
TeachApex
15
Network Security
Virtualization
Insert or Drag and Drop your Screen Design here
TeachApex
16
Network Security
Types of Virtualization
Network Functions
Server Virtualization Desktop Virtualization
Virtualization
TeachApex
17
Network Security
Why do we Need Cloud
Computing?
Cloud Computing
Using Cloud Computing, users are able to
access software and applications from wherever
they need, while it is being hosted by an outside
party – in “the cloud”.
TeachApex
19
Network Security
3 types of Cloud Computing
TeachApex
20
Network Security
Cloud Computing Deployment Models
TeachApex
21
Network Security
Network Design
Elements and
Components –
Part 4
TeachApex
22
Network Security
What is the Internet of
Things, or IoT?
TeachApex
23
Network Security
10 Predictions about the Future of IoT
(Continued..)
By 2025, it is Cybercriminals will More cities will Artificial Routers will continue
estimated that there continue to use IoT become “smart” Intelligence will to become more
will be more than to devices to facilitate continue to become a secure and smarter
21 billion IoT devices DDoS attacks bigger thing
TeachApex
24
Network Security
10 Predictions about the Future of IoT
5G Networks will Cars will get even 5G’s arrival will also IoT-based DDoS Security and
continue to fuel IoT smarter open the door to new attacks will take on privacy concerns will
growth privacy and security more dangerous drive legislation and
concerns forms regulatory activity
TeachApex
25
Network Security
Defense In Depth: Layered Security
○ Defense-in-depth security architecture is based on controls that are designed to protect the physical,
technical and administrative aspects of your network.
○ Defense-in-depth is an information assurance strategy that provides multiple, redundant defensive measures
in case a security control fails or a vulnerability is exploited.
TeachApex
26
Network Security
Defense In Depth
An approach to cybersecurity in which a series of defensive
mechanisms are layered in order to protect valuable data and
information.
TeachApex
27
Network Security
Defense In Depth
Additionally, the following security layers help protect individual facets of your network:
TeachApex
28
Network Security
Thank You!
TeachApex
29
Network Security