Types of firewall configurations

From the course by 科罗拉多大学系统
Detecting and Mitigating Cyber Threats and Attacks
37 ratings
37 ratings
Course 3 of 4 in the Specialization Cybersecurity for Business
From the lesson
Introduction and Firewalls
Welcome! This week we'll explore firewalls as they are usually the first line of defense against a threat or attack.

Meet the Instructors

  • Greg Williams
    Greg Williams
    Department of Computer Science

Explore our Catalog

Join for free and get personalized recommendations, updates and offers.