sy0-701_Lesson 09
sy0-701_Lesson 09
Lesson 9
Evaluate Network Security Capabilities
Topic 9A
Network Security Baselines
3
Benchmarks and Secure Configuration Guides
• Configuration management
• Help manage, deploy, and measure compliance with established secure baselines
• Puppet utilise le langage ruby
• CIS-CAT Pro
4
Switches and Routers
• Examples of changes designed to improve security:
• Change Default Credentials
• Disable Unnecessary
• Strong Password
7
Wireless Encryption
• Open
• WEP
• WPS
• WPA & WPA2
• WPA3
• Device Provisioning Protocol (DPP)
a.k.a. “Easy Connect” to replace WPS Configuring a TP-LINK SOHO access
point with wireless encryption and
• Simultaneous Authentication of Equals authentication settings. In this
example, the 2.4 GHz band allows
(SAE) legacy connections with WPA2-
Personal security, while the 5 GHz
network is for 802.11ax (Wi-Fi 6)
capable devices using WPA3-SAE
• Enhanced Open authentication. (Screenshot used
with permission from TP-Link 8
Technologies.)
Wi-Fi Authentication Methods
• WPA2 Pre-Shared Key Authentication
• WPA3 Personal Authentication
• WPA2/WPA3-Enterprise
• RADIUS
• EAP
9
Network Access Control
• Authenticates users/devices
before allowing them access to
the network
• Agent versus agentless
11
Lab Activity
• Assisted Lab: Understanding Security Baselines
12
Lesson 9
Topic 9B
Network Security Capability
Enhancement
• Firewall Rule
• Dictates how inbound or outbound
network traffic for specific IP addresses, IP
ranges, or network interfaces
• Screened Subnet Sample firewall rules configured on IPFire. This ruleset allows any HTTP,
HTTPS, or SMTP traffic to specific internal addresses. (Screenshot used with
permission from IPFire)
• A neutral zone, separating public-facing
servers from sensitive internal network
resources
14
Intrusion Detection and Prevention Systems
• Host-based
• Network-based
• Both look for suspicious patterns or
activities that could indicate a
network or system intrusion
• They differ in their responses to
perceived threats
• Snort
The Security Onion Alerts dashboard displaying several alerts captured using
the Emerging Threats (ET) ruleset and Suricata. (Screenshot used with
• Suricata
permission from Security Onion.)
• OSSEC
15
IDS and IPS Detection Methods
• Signature-Based Detection
• Anomaly-based detection
• Trend Analysis
• Behavioral-based detection
• Network Behavior and Anomaly
Detection (NBAD)
16
Web Filtering
• Block users from accessing malicious or
inappropriate websites
• Enforce compliance with acceptable use
• Block malware
• Protection from phishing attacks
• Agent-Based Filtering
• Centralized Web Filtering
• URL Scanning
• Content Categorization
• Block Rules
Web filter content categories using the IPFire open-source firewall.
(Screenshot used with permission from IPFire.) • Reputation-Based Filtering
• Decrypting and inspecting HTTPS traffic
17
Review Activity: Network Security Capability Enhancement
• Access Control Lists
• Intrusion Detection and Prevention Systems
• IDS and IPS Detection Methods
• Web Filtering
18
Lab Activity
• Applied Lab: Implementing a Firewall
19
CompTIA Security+ Exam SY0-701
Lesson 9
Summary