October 2019
Intermediate to advanced
374 pages
13h 10m
English
In addition to securing workstations and servers, you should examine the network itself and any external cloud-based services your users interact with. Even with very secure workstations and servers, most networks have multiple devices that not only connect to them but make the networks work. And as more and more organizations integrate cloud-based services into their normal operation, the scope of the organization grows to include the cloud service providers.
There are many security benefits to using IPv6, as opposed to the more common IPv4 protocol. IPv6 was designed for security and has several built-in security features. Although some IPv6 features can be used in IPv4 now, such as ...
Read now
Unlock full access