Types of firewall configurations

From the course by University of Colorado System
Detecting and Mitigating Cyber Threats and Attacks
25 ratings
University of Colorado System
25 ratings
Course 3 of 4 in the Specialization Cybersecurity for Business
From the lesson
Introduction and Firewalls
Welcome! This week we'll explore firewalls as they are usually the first line of defense against a threat or attack.

Meet the Instructors

  • Greg Williams
    Greg Williams
    Department of Computer Science