MP4 | Video: AVC 1280×720 | Audio: AAC 44KHz 2ch | Duration: 30M | 1.05 GBGenre: eLearning | Language: English30 Minutes of Video InstructionOverviewSecurity for Software Defined Networks—Networking Talks provides you with practical advice and principles of security for and by Software Defined Networks.
DescriptionSecurity for Software Defined Networks—Networking Talks introduces security concepts that can be applied to SDN.
The course starts with an overview of Software Defined Networking, examining what the architecture provides and detailing the various deployment models.
Natalie Timms, CCIE Security, then provides an understanding of SDN and security, outlining how typical security considerations change when applied to an SDN.
The course then dives a little deeper, detailing security for and by Software Defined Networks.
Throughout this Networking Talk you will be introduced to concepts such as controller specific hardening, device hardening, network services, application and APIs, management and provisioning, communication channels, agent security services, and agent threat management.
Major sections are as follows:Lesson 1—SDN OverviewLesson 2—SDN and SecurityLesson 3—Security for the SDNLesson 4—Security by the SDNLesson 5—SummaryAbout the InstructorNatalie Timmsis a former program manager with the CCIE certification team at Cisco, managing exam curriculums and content for the CCIE Security track before becoming an independent consultant.
Natalie has been involved with computer networking for more than 20 years, much of which was spent with Cisco.
Natalie has contributed at the IETF standards level and has written many technical papers and is also a Cisco Press author and U.
S.
patent holder.
Natalie has also been a technical instructor in the Asia Pac region for Wellfleet Communications/Bay Networks and a multiple Cisco Live Distinguished Speaker award winner.
Natalie has a CCIE Security Certification and has a BSc in Computer Science and Statistics from Macquarie University in Sydney, Australia.
Skill LevelIntermediateWhat You Will LearnHow Software-Defined Network (SDN) transitions security from being an overlay service to a core component of the networkHow SDN must provide secure boundaries around services and accessHow SDN agents and controllers can be provisioned to be a perimeter to an individual device or serviceHow SDN can provision and enforce a security strategy with the success of this strategy depending on how well the SDN itself is protectedWho Should Take This CourseThe target audiences for this video course are those considering SDN deployment, or anyone interested in a starting point for more research on securing an SDN.
The Primary audience includes:Security ProfessionalsNetwork ArchitectsBusiness leaders considering SDNCourse RequirementsKnowledge of common security attack methodologiesFamiliarity with security protection methodsTable of ContentsLesson 1—SDN OverviewIn this lesson, we will explore how a Software Defined Network (SDN) transitions security from being an overlay service to a core component of the network.
We will take a look at the SDN architecture and deployment models.
Lesson 2—SDN and SecurityIn this lesson we will take a look at how SDN must provide secure boundaries around services and access.
We will compare typical DoS and SDN DoS and also examine the differences between security by the SDN and security for the SDN.
Lesson 3—Security for the SDNThis lesson will explore how SDN agents and controllers can be provisioned to be a perimeter to an individual device or service.
To understand this more fully we will take a look at security by the SDN in action.
Lesson 4—Security by the SDNIn this lesson we will see how SDN can provision and enforce a security strategy with the success of this strategy depending on how well the SDN itself is protected.
We will explore controller specific hardening, Device Hardening for Agents and Controllers, Network Service security, and more.
Lesson 5—SummaryIn this summary lesson we will discuss how SDN is an opportunity to make security the focal point of a network solution rather than an overlay.