Mitigation Techniques
Welcome to the Mitigation Techniques practice lab. In this module, you will be provided with the instructions and devices needed to develop your hands-on skills.
Mitigation techniques are used to secure the enterprise environment. Concepts such as segmentation, access control, patching, encryption, configuration, and hardening keep the network protected. This module focuses on access control, encryption and monitoring through the process of hardening a network router.
Overview
Learning Outcomes:
In this module, you will complete the following exercises:
- Exercise 1 - Configure Router Access
- Exercise 2 - Harden Router Access
- Exercise 3 - Configure Router Logging
After completing this module, you should be able to:
- Review router configuration and create local credentials.
- Configure SSH remote access.
- Disable unused services.
- Restrict router access.
- Configure NTP.
- Configure and test logging.
Exam Objectives:
The following exam objectives are covered in this module:
2.5 Explain the purpose of mitigation techniques used to secure the enterprise
- Access control
- Encryption
- Monitoring
- Configuration enforcement
- Hardening techniques
4.1 Given a scenario, apply common security techniques to computing resources
- Hardening targets
4.4 Explain security alerting and monitoring concepts and tools
- Activities
4.5 Given a scenario, modify enterprise capabilities to enhance security
- Firewall