Data Communications & IP Technologies black icon

Course: Introduction to Network Security

6   |   65   |   Lifetime
Included for FREE! $39 Worth
Syllabus
Description The Network Security Essentials course starts with introducing the common risks to the organization network, including viruses, worms, Trojans, OS vulnerabilities, DoS/DDoS and more. We talk about the basics of data deletion, duplication and modification risks, OS and applications vulnerabilities, eavesdropping and data forgery, disguised Identities and others. We continue with describing protection mechanisms, including authentication, access control, confidentiality, integrity and others, and how they are used to protect the organization data. Follows the principles part we talk about the purpose and operation principles of firewalls including packet filtering and statefull inspection and VPNs, including the operation of Site-to-Site and Client-to-Site connectivity. We continue with common security protocols, authentication and encryption principles, describing the principles of authentication, from the basic username and password access to challenge-response mechanisms and advanced token and biometrics methods. In the protocols area we talk about basic cryptography, symmetric and asymmetric encryption, Di­e-Hellman algorithm and key-exchange mechanisms, RSA, PKI, KDCs, Certificates and digital signatures. The course is in introduction level, describing the operating principles of network security, preparing the participant to the advanced courses in this section.
Course Modules
The course includes the following modules:
  • 1.  Network Security Essentials
    This lesson describes the major security risks that threatens your network, including viruses, worms, Trojans and others
  • 2.  Firewalls and VPNs
    This chapter describes the operation of firewalls, including security zones, packet filtering, stateful inspection, NAT and VPNs
  • 3.  Network Security Elements
    In this chapter we talk about intrusion detection and prevention mechanisms (IDS/IPS), Network Access Control (NAC), Security Information and Event Management systems and other security components
  • 4.  Security Protocols Basics
    Here we talk about threats to information systems, and the building blocks of security – Confidentiality, Integrity and Availability (CIA), and protocols that implements them
  • 5.  Security Protocols
    In this chapter we talk about stream and block cyphers, symmetric and asymmetric encryption, key-exchange algorithms and RSA
  • 6.  Authentication Protocols
    Here we talk about authentication methods, from the basic username and password, challenge-response, tokens and biometric mechanisms, KDCs, Certificates and digital signatures
Take This Course