From the course: ISC2 Systems Security Certified Practitioner (SSCP) (2024) Cert Prep
Unlock this course with a free trial
Join today to access over 24,900 courses taught by industry experts.
Unified threat management
From the course: ISC2 Systems Security Certified Practitioner (SSCP) (2024) Cert Prep
Unified threat management
- [Instructor] We've talked about a lot of different security devices in this course and one of the major issues associated with them is that purchasing all of these devices can be very expensive, particularly for a small or mid-sized organization. Unified threat management or UTM solutions try to solve this problem by combining many different security functions on a single device. UTM products start by performing the basic functions of a firewall and router, protecting the network against many attacks, blocking unsolicited traffic and routing traffic to and from the internet. Then they add some of the security features that we've discussed already in this course, including VPN connectivity, intrusion detection, and intrusion prevention. UTM products also often include other features useful to small businesses that might not be found in enterprise security devices. For example, they often perform both URL filtering to…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- (Locked) Routers, switches, and bridges3m 11s
- (Locked) Firewalls6m 17s
- (Locked) Proxy servers2m 46s
- (Locked) Load balancers4m 19s
- (Locked) VPNs and VPN concentrators4m 39s
- (Locked) Network intrusion detection and prevention5m 13s
- (Locked) Protocol analyzers7m
- (Locked) Content distribution networks3m 50s
- (Locked) Traffic shaping and WAN optimization1m 46s
- (Locked) Unified threat management1m 57s
- (Locked)
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-