Mile2 Cybersecurity Certifications

Cybersecurity Certifications

OCU C)NP C Week 04 Lesson 07 Discussion

Viewing 4 reply threads
  • Author
    Posts
    • #66084
      Jessica Jagerson
      Keymaster

      Provide at least two controls or methods that help harden servers and networks.

    • #105640
      Kanthony
      Participant

      Hi everyone! Welcome to week 4.

      Please email me if you ever have any questions.

      This week, you need to read chapters 7 and 8 and watch the videos.

      Then, complete the week four devotional and discussion questions. Remember to reply to other students for the discussion questions too. *You don’t have to include a Word or PDF document for the devotion or document.

      Finally, complete chapters 7 and 8 exams.

      Most importantly is our time with Jesus. Please email me if you have a prayer request. My family and I will pray for you.

      Have a great week! ~Dr. Anthony

    • #105659
      Mjulius513
      Participant

      To help harden servers and networks, one important method is to disable unused services and ports. Servers often come with many services running by default, and not all of them are needed. Each open port or active service can be a way for attackers to get in. By turning off the ones you don’t use, you reduce the number of ways someone could attack your system.

      Another helpful method is setting up strong password policies. This means requiring users to create passwords that are hard to guess, with a mix of letters, numbers, and symbols. Also, changing passwords regularly and not reusing old ones adds more protection. Weak or reused passwords are one of the most common ways hackers get access.

      Some more ways to strengthen the security of servers and networks. When you combine these methods with other measures, like firewalls and regularly updating software, you can better protect against many cyber threats.

      • #105673
        Trae Johnson
        Participant

        Great points disabling unused services and having strict password policies are essential to reducing vulnerabilities. With other such controls like firewalls and updates, they improve overall security significantly.

    • #105667
      Erin Kesterson
      Participant

      Two controls or methods that help harden a server or network.

      One would be the firewall it makes a foundation to secure a policy that will denie all traffic unless explicitly permitted. It looks and updates the rules and changes in a network and requirements, closing any unused or unnecessary network ports to reduce the attacks.

      The second one would be Zero Trust Network Access (ZTNA) This is just as it is said it allows no access in a connections security and it will need to be reautherized for every action taken. This help keep the data and network secure and hard to override, Even with familiar and trusted networks trying to access it it gets blocked till its autherized. Organizations can define the securitypolicies for each deviced connected to the network.

      • #105674
        Trae Johnson
        Participant

        Great choices, firewalls and ZTNA both play key roles in minimizing risk and controlling access. They form a strong foundation for a secure network…

      • #105685
        Mjulius513
        Participant

        Two strong ways to protect a server or network are firewalls and Zero Trust Network Access (ZTNA). A firewall blocks all traffic unless it’s allowed, helping stop unwanted access. ZTNA adds more safety by not trusting any device by default. Every action must be approved, even from known networks, making it harder for threats to get in. What other methods do you think are important for securing a network?

    • #105672
      Trae Johnson
      Participant

      Implement Firewalls and Access Control Lists (ACLs):
      Firewalls serve to create a barrier between untrusted and trusted networks, restricting incoming and outgoing traffic based on predefined security policies. ACLs go a step further by establishing what users or devices can access specific resources or services. Together, they restrict the attack surface and deny unauthorized access.

      Regular Patch Management and System Updates
      Implementing security patches and updates in a timely manner prevents known vulnerabilities within operating systems, applications, and firmware from being exploited by attackers. Automation ensures constant security throughout the network.

Viewing 4 reply threads
  • You must be logged in to reply to this topic.

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email information@mile2.com .

Privacy Overview
Mile2 Cybersecurity Certifications

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.