About

About

This Pathway outlines the basics of edge network traffic along with discussing the best practices in securing edge network traffic.

This is a Pathway on Securing Edge Network Traffic. Edge network traffic is secured by a combination of the perimeter, application security, and vulnerability management.

By the end of this Pathway, you will be able to:

  1. Explain the basics of Edge Security
  2. Describe methods used for Edge Security
  3. Discover a few industry best practices for securing remote assets