Advanced Course in Network Security - Self Paced Learning Program
What is Data Security?
Essentials to Network Security
How to Understand CIA Triad
Information Assurance Principles
Network Defense Benefits
Network Defense Challenges
Network Defense Approaches
What is a computer network?
Computer network types
Important terms and concepts
Examples of computer networks
Computer networks and the internet
How do they work?
Architecture
Network topology
Mesh networks
Load balancers and networks
Packet travelling
OSI model
Encapsulation and decapsulation
Key players
Difference between frames and packets?
Address resolution protocol (arp)
What is TCP/IP model?
The key difference between OSI and TCP/IP model
Advantages and disadvantages of both models
TCP 3-way handshake (syn, syn-ack, ack)
Essential network security protocols and authentications
Fundamental networking and security tools
Network security controls - administrative controls
Regulatory frameworks, laws, and acts
Regulatory frameworks compliance
Security awareness
Fundamental Networking And Security Tools
Ø Tracert
Ø NetStat
Ø PuTTY
Investigating The Unexpected
Troubleshooting Microsoft Windows
Networking And Server Attacks
Network Security Devices, Technologies, and Design
Wireless Network Security
Zenmap And Wireshark Lab
Understanding Cryptographic Techniques
Objectives of Cryptography
Encryption – Symmetric and Asymmetric
Government Access to Keys (gak)
Labs