Modules
Defensible Network Architecture
Understanding the Architecture of the System
Conceptual Design
Logical Design
Physical Design
Understand Communication Flow
Know Where Your Valuable Data Is
Networks under attack
Threat Enumeration
Threats drive the risk calculation and important for understanding the adversary:
Attacks against Routers
Attacks against Switches
Physical Topologies
Logical topologies
Ethernet
Approaches to Network Design
Segmentation
Protected Enclave
Software Defined Networking (SDN)
- Micro-segmentation
Network Architecture Design
Prioritized Protection of Key Resources
Most enterprise networks are relatively flat and offer little resistance once the perimeter is breached.
Network Design Objectives
Network sections (1 of 2)
Locate firewalls:
Network sections (2 of 2)
three goals of network design:
1- any system visible from the internet must reside on the DMZ and cannot contain sensitive info
2- any system with sensitive info must reside on the private network and not be visible from the internet
3- the only way a DMZ system can communicate with a private network system is through a proxy on the middle-ware tier
Summary
Module 2: Virtualization and Cloud Security
Virtual machines
The key component of virtualization is the ability for abstracting and emulating of specific hardware components which is done by the ?
hypervisor