1 00:00:00,180 --> 00:00:03,620 In this section, we're going to discuss perimeter security. 2 00:00:03,620 --> 00:00:05,470 Now, when we talk about perimeter security, 3 00:00:05,470 --> 00:00:06,980 we're focused on the outer layer 4 00:00:06,980 --> 00:00:09,770 of our defense-in-depth posture for our networks. 5 00:00:09,770 --> 00:00:10,603 This is the boundary 6 00:00:10,603 --> 00:00:12,610 where we segment our LAN from the WAN 7 00:00:12,610 --> 00:00:14,720 and from the Internet at large. 8 00:00:14,720 --> 00:00:17,150 When we focus on the boundary, or perimeter defenses, 9 00:00:17,150 --> 00:00:19,280 we utilize many different devices. 10 00:00:19,280 --> 00:00:22,110 In this section, you're going to learn all about firewalls, 11 00:00:22,110 --> 00:00:24,940 proxy servers, honey pots and honey nets, 12 00:00:24,940 --> 00:00:26,530 data loss prevention systems, 13 00:00:26,530 --> 00:00:28,150 network intrusion detection systems 14 00:00:28,150 --> 00:00:29,880 and network intrusion prevention systems, 15 00:00:29,880 --> 00:00:31,280 and combination devices, 16 00:00:31,280 --> 00:00:34,690 like a unified threat management system, or UTM. 17 00:00:34,690 --> 00:00:36,000 A lot of this is going to be a review 18 00:00:36,000 --> 00:00:37,310 from your Network+ studies, 19 00:00:37,310 --> 00:00:39,550 so we're going to cover this section fairly quickly, 20 00:00:39,550 --> 00:00:41,080 pointing out the things you need to know 21 00:00:41,080 --> 00:00:42,670 for the Security+ exam. 22 00:00:42,670 --> 00:00:44,950 So, let's get started with our exploration 23 00:00:44,950 --> 00:00:47,450 of perimeter security devices.