As a modern security administrator, it is critical to understand the differences, advantages, and disadvantages inherent in technologies implemented in a corporate network. This section will discuss very important technologies, such as the DMZ, NAT, virtualization, and cloud computing, and will cover the following topics:
- DMZ
- Subnetting
- VLANs
- NAT
- Remote Access
- Telephony
- NAC
- Virtualization
- Cloud Computing
DMZ
Quite possibly, the most important security concern is at the network perimeter (the locus of most attacks), where the company intranet meets . . .
The content below this message is for members only.