Dominio
Networking & Telecom
Perfil de habilidad
Network segmentation: VLAN, microsegmentation, Zero Trust Network, DMZ
Roles
1
donde aparece esta habilidad
Niveles
5
ruta de crecimiento estructurada
Requisitos obligatorios
0
los otros 5 opcionales
Networking & Telecom
Network Security
17/3/2026
Selecciona tu nivel actual y compara las expectativas.
La tabla muestra cómo crece la profundidad desde Junior hasta Principal.
| Rol | Obligatorio | Descripción |
|---|---|---|
| Network Engineer | Understands why network segmentation is needed and the main approaches: VLAN, subnet, DMZ. Knows the principle of least privilege for network access. |
| Rol | Obligatorio | Descripción |
|---|---|---|
| Network Engineer | Designs network segmentation for the organization: DMZ, internal zones, management network. Configures inter-VLAN routing and ACLs. Implements microsegmentation. |
| Rol | Obligatorio | Descripción |
|---|---|---|
| Network Engineer | Implements zero-trust microsegmentation with policy-based access control. Designs software-defined perimeter. Assesses and eliminates lateral movement risks. |
| Rol | Obligatorio | Descripción |
|---|---|---|
| Network Engineer | Defines network segmentation strategy. Makes decisions on microsegmentation granularity. Manages the transition to zero-trust. This skill is critically important for successful performance in the role. |
| Rol | Obligatorio | Descripción |
|---|---|---|
| Network Engineer | Shapes zero-trust network architecture for the organization. Researches SASE and network security evolution. Influences security architecture. |