Presentation is loading. Please wait.

Presentation is loading. Please wait.

This courseware is copyrighted © 2011 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.

Similar presentations


Presentation on theme: "This courseware is copyrighted © 2011 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to."— Presentation transcript:

1 This courseware is copyrighted © 2011 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to accompany the courseware may be copied, photocopied, reproduced, or re-used in any form or by any means without permission in writing from a director of gtslearning International Limited. Violation of these laws will lead to prosecution. All trademarks, service marks, products, or services are trademarks or registered trademarks of their respective holders and are acknowledged by the publisher. All gtslearning products are supplied on the basis of a single copy of a course per student. Additional resources that may be made available from gtslearning may only be used in conjunction with courses sold by gtslearning. No material changes to these resources are permitted without express written permission by a director of gtslearning. These resources may not be used in conjunction with content from any other supplier. If you suspect that this course has been copied or distributed illegally, please telephone or email gtslearning. CompTIA Server+ Certification 2.5 Server Security

2 Objectives Understand how subnets and firewalls can be used to create different security zones, such as a DMZ Describe different types of firewall and the basics of configuring a software firewall Identify different malicious software threats and security software and policies to defend against them 2.5 Server SecuritySlide 2

3 Subnets and Zones 2.5 Server SecuritySlide 3

4 DMZ Screened subnet Three-legged firewall Screened host 2.5 Server SecuritySlide 4

5 Firewalls and Proxy Servers NAT Packet filtering Circuit-level gateway Application-layer gateway Stateful Multilayer Inspection 2.5 Server SecuritySlide 5

6 Installing and Configuring Firewalls 2.5 Server SecuritySlide 6

7 Proxy and Filter Servers Proxy Server – Filter traffic – Cache pages – Pre-fetch pages Reverse Proxy – Publishes private server to public Internet Filter / Gateway 2.5 Server SecuritySlide 7

8 Malware 2.5 Server SecuritySlide 8 Virus / worm – Boot sector viruses – Program viruses – Multipartite viruses – Worms – Script viruses Spyware, Adware, and Trojans

9 Anti-Virus Software Virus identification Removal / quarantine Policies 2.5 Server SecuritySlide 9

10 Review Understand how subnets and firewalls can be used to create different security zones, such as a DMZ Describe different types of firewall and the basics of configuring a software firewall Identify different malicious software threats and security software and policies to defend against them 2.5 Server SecuritySlide 10

11 Labs Lab 7 Configuring Server Security 2.5 Server SecuritySlide 11


Download ppt "This courseware is copyrighted © 2011 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to."

Similar presentations


Ads by Google