This course introduces the concept of a network Demilitarized Zone (DMZ) and the security benefits it can provide. Best practices for designing and implementing a DMZ is followed with a section on IDS and IPS systems that includes an in-depth look at SNORT for network monitoring. The course concludes with log analysis and management best practices.
Learning Objectives
- Present an overview of the DMZ security model and key components.
- Discuss DMZ structure, purpose, and operation.
- Present different models for implementation to meet network requirements.
- Discuss the network threats that a DMZ can detect and mitigate.
Framework Connections
Specialty Areas
- Cyber Defense Infrastructure Support
- Network Services
- Systems Analysis
Feedback
If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.