New Training: Security Solutions in Infrastructure Management
In this 14-video skill, CBT Nuggets trainer Ben Finkel teaches you about change management, network segmentation, Cloud Access Security Brokers (CASB), and more. Learn how to use single sign-on and multi-factor authentication, how to secure virtualization and containers, and how to use a honeypot. Watch this new CompTIA training.
Watch the full course: CompTIA Cybersecurity Analyst
This training includes:
1.2 hours of training
You’ll learn these topics in this skill:
Security Solutions in Infrastructure Management
Cloud vs. On-Premises Security Concerns
Cloud Access Security Brokers (CASB)
Asset Tagging for Security
Change Management Security Solutions
Physical and Virtual Network Segmentation
Securing Network Architecture
Securing Virtualization and VDI
Identity Management Strategies
Managing Accounts Securely
Creating Stronger Access Controls
Using a Honeypot
Security Solutions in Infrastructure Management Summary
What Exactly is a Honeypot?
There’s a concept in network security that can be fun to imagine like a real-world metaphor. Imagine you’re trying to protect something, like a house. Sure you’ve got defenses like secured windows, locked doors and motion-sensor lights. But those are all responses — what if you want to do something proactive?
What if you could build a complete replica house, fill it with fake valuables and then put cameras all around it? For all intents and purposes, it looks like a real house, but it also looks particularly vulnerable to a break in.
When the burglars come along, maybe they use a certain kind of crowbar, or maybe they have a device that disables alarms, or they use treats to make dogs stay quiet. You watch and learn their methods (leaving aside that in this case you could even catch them in the act) and then learn how to counteract them. And then you incorporate those methods into your own home security.
This sort of tactic is used in international espionage, police tactics, and even network security — it’s called a honeypot. And in cyber security, there are all sorts of honeypots: email traps, malware honeypots, decoy databases and more. All work on the same principle: make an attractive target and watch how bad guys infiltrate it so you can build better defenses on the real thing.