Natsar, LLC/Introduction to Defense in Depth and Secure Network Design

  • Free

Introduction to Defense in Depth and Secure Network Design

  • Course
  • 7 Lessons

Earn Continuing Professional Education (CPE) credits at no cost from Natsar.

Implementing Defense in Depth and Secure Network Design is essential for protecting against cyber threats. Josh Moulin of Natsar explores key principles and strategies for a layered security approach. Learn about firewalls, IDS/IPS, Zero Trust, DNS security, VPNs, and network segmentation to enhance resilience and minimize attack surfaces.

Contents

Module 1 | Introduction and Course Objectives

Introduction to Defense in Depth and Secure Network Design - Module 1

    Module 2 | Defense-in-Depth

    Introduction to Defense in Depth and Secure Network Design - Module 2

      Module 3 | DNS Security

      Introduction to Defense in Depth and Secure Network Design - Module 3

        Module 4 | Network Segmentation

        Introduction to Defense in Depth and Secure Network Design - Module 4

          Module 5 | Network Analytics and Architecture

          Introduction to Defense in Depth and Secure Network Design - Module 5

            Module 6 | Zero Trust Network Access (ZTNA)

            Introduction to Defense in Depth and Secure Network Design - Module 6

              Module 7 | Virtual Private Networks (VPNs)

              Introduction to Defense in Depth and Secure Network Design - Module 7

                What You Will Learn

                Explore the essential principles of Defense in Depth and Secure Network Design in this comprehensive course by Josh Moulin, Principal at Natsar. This video is designed for those just getting started in IT and cybersecurity or professionals looking to strengthen their understanding of layered security strategies and build resilient network architectures to mitigate cyber threats. Learn how to implement multiple security controls, reduce attack surfaces, and leverage industry best practices to safeguard networks. This course is ideal for security practitioners, IT administrators, and anyone interested in enhancing network defense through practical, real-world strategies.

                Key topics covered include:

                • The fundamentals of Defense in Depth and why a layered approach is crucial for cybersecurity.

                • Implementing network security tools like firewalls, IDS/IPS, and Zero Trust frameworks.

                • The role of network segmentation in reducing attack surfaces and improving security.

                • DNS security strategies to protect against domain-based cyber threats.

                • The benefits and challenges of VPNs for secure remote access and enterprise environments.

                • Best practices for designing secure networks that enhance resilience and minimize risks.

                This video provides actionable insights and practical techniques to help you design and implement robust security architectures. Whether you’re new to network security or an experienced professional, you’ll gain valuable knowledge to strengthen your organization’s cybersecurity posture.

                Subscribe now for more expert tips and insights on cybersecurity. You can also sign up for Natsar’s newsletter at https://natsar.substack.com.

                Josh Moulin

                Meet Your Instructor

                Josh Moulin

                MSc., CAWFE, CEH, CFCE, CHFI, CISSP, CNDA, DFCP, GCFA, GCFR, GCIA, GIME, GSEC

                Josh Moulin is a cybersecurity leader with over 20 years of experience protecting critical systems and advising organizations worldwide. He began his career in law enforcement, where he led a cybercrimes task force and a digital forensics lab, pioneering efforts to combat cyber crime. Later, Josh served as a CIO and CISO in the U.S. nuclear weapons complex and as Senior Vice President of Operations at the Center for Internet Security (CIS), where he collaborated with DHS and CISA to secure U.S. state, local, tribal, territorial (SLTT), and election organizations through the MS-ISAC and EI-ISAC. He also served as an Executive Partner at Gartner, advising federal and military leaders on strategic cybersecurity initiatives.

                In addition to founding Natsar, LLC, a cybersecurity consulting firm, Josh is adjunct faculty teaching university courses on cybersecurity and digital forensics. With a Master’s in Information Security and Assurance and numerous certifications, Josh’s highly rated courses draw from real-world expertise to equip learners with the tools to navigate today’s complex cybersecurity landscape.

                You May Also Like

                • $29.95

                Risk Register

                • Download
                • 1 file
                • Includes 1 additional product

                Frequently asked questions

                You've got questions. We've got answers.

                Is this really free?

                Yes! We understand that finding quality CPEs is difficult and can be expensive. We are giving back to the cybersecurity community by providing no-cost continuing education.

                Do I get a certificate?

                Absolutely. Once you complete the presentation, you will receive a certificate that can be used to provide evidence of your training when submitted CPEs. The certificate is available immediately upon the completion of the content.

                Do you offer customized training?

                We definintely do. Natsar has trained individuals, companies, and organizations across the world in various cybersecurity topics. If you're interested in having us do some training for you, please reach out at [email protected]!