This course introduces the concept of a network Demilitarized Zone (DMZ) and the security benefits it can provide. Best practices for designing and implementing a DMZ is followed with a section on IDS and IPS systems that includes an in‐depth look at SNORT for network monitoring. The course concludes with log analysis and management best practices.
Present an overview of the DMZ security model and key components.
Discuss DMZ structure, purpose, and operation.
Present different models for implementation to meet network requirements.
Discuss the network threats that a DMZ can detect and mitigate.
The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.