WEEK 1: Chapter 1: Modern Network Security Threats
Connections to untrusted networks must be checked in-depth by multiple layers of defense before reaching enterprise resources
CAN
A consumer-grade router with basic security features is used to protect inside assets from the outside attackers
SOHO
Core components, such as Secure Segmentation, Threat Defense, and Visibility, are used as part of an easy to implement yet comprehensive strategy
Cloud
VPN technologies implemented on ASA devices and high-speed Nexus switches are used to connect the off-site facility to corporate sites
Data Center
Secure devices, such as an ASA, are used on the edge of the networks to provide stateful firewall features and establish secure VPN tunnels to various destinations
WAN