CSC 4111 Computer Security and Network Virtualization

(CSC-4111.ABE1)
Lessons
Lab
TestPrep
Get A Free Trial

Skills You’ll Get

1

The OSI Model and Encapsulation

  • The Purpose of Reference Models
  • The OSI Model
  • The TCP/IP Stack
  • Real-World Case Study
  • Summary
  • Review All the Key Topics
  • Additional Resources
2

Network Topologies and Types

  • Defining a Network
  • Network Types and Characteristics
  • Networks Defined Based on Resource Location
  • Networks Defined by Topology
  • Virtual Network Concepts
  • Provider Links
  • Real-World Case Study
  • Summary
  • Review All the Key Topics
  • Additional Resources
3

Network Media Types

  • Copper and Fiber Media and Connectors
  • Unshielded Twisted Pair
  • Plenum Versus Nonplenum Cable
  • Multiplexing in Fiber-Optic Networks
  • Cable Management
  • Real-World Case Study
  • Summary
  • Review All the Key Topics
  • Additional Resources
4

Common Ports and Protocols

  • Ports and Protocols
  • IP Protocol Types
  • Summary
  • Review All the Key Topics
  • Additional Resources
5

Corporate and Datacenter Architectures

  • The Three-Tiered Network Architecture
  • Software-Defined Networking
  • Storage Area Networks
  • Deciding on an Architecture
  • Summary
  • Review All the Key Topics
  • Additional Resources
6

Various Network Devices

  • Networking Devices
  • Networked Devices
  • Summary
  • Review All the Key Topics
  • Additional Resources
7

Routing Technologies and Bandwidth Management

  • Routing
  • Sources of Routing Information
  • Routing Protocol Characteristics
  • Routing Protocol Examples
  • Bandwidth Management
  • Summary
  • Review All the Key Topics
  • Additional Resources
8

Ethernet Switching

  • Principles of Ethernet
  • Ethernet Switch Features
  • Summary
  • Review All the Key Topics
  • Additional Resources
9

Wireless Standards

  • Introducing Wireless LANs
  • Deploying Wireless LANs
  • Securing Wireless LANs
  • Summary
  • Review All the Key Topics
  • Additional Resources
10

Organizational Documents and Policies

  • Plans and Policies
  • Hardening and Security Policies
  • Common Documentation
  • Summary
  • Review All the Key Topics
  • Additional Resources
11

High Availability and Disaster Recovery

  • High Availability
  • Real-World Case Study: SOHO Network Design
  • Summary
  • Review All the Key Topics
  • Additional Resources
12

Common Security Concepts

  • Core Security Concepts
  • Authentication Methods
  • Risk Management and SIEM
  • Summary
  • Review All the Key Topics
  • Additional Resources
13

Common Types of Attacks

  • Technology-Based Attacks
  • Human and Environmental Attacks
  • Other Miscellaneous Attacks
  • Summary
  • Review All the Key Topics
  • Additional Resources
14

Network Hardening Techniques

  • Best Practices
  • Wireless Security and IoT Considerations
  • Summary
  • Review All the Key Topics
  • Additional Resources
15

Remote Access Methods

  • Virtual Private Networks (VPNs)
  • Other Remote Access Technologies
  • Authentication and Authorization Considerations
  • In-Band vs. Out-of-Band Management
  • Summary
  • Review All the Key Topics
  • Additional Resources
16

Physical Security

  • Detection Methods
  • Prevention Methods
  • Asset Disposal
  • Summary
  • Review All the Key Topics
  • Additional Resources
17

A Network Troubleshooting Methodology

  • Troubleshooting Basics
  • Summary
  • Review All the Key Topics
  • Additional Resource
18

Troubleshoot Common Wireless Issues

  • Specifications and Limitations
  • Considerations
  • Common Issues
  • Wireless Network Troubleshooting
  • Summary
  • Review All the Key Topics
19

Understanding Virtualization

  • Describing Virtualization
  • Understanding the Importance of Virtualization
  • Understanding Virtualization Software Operation
20

Understanding Virtual Machines

  • Describing a Virtual Machine
  • Understanding How a Virtual Machine Works
  • Working with Virtual Machines
21

Creating a Virtual Machine

  • Performing P2V Conversions
  • Loading Your Environment
  • Building a New Virtual Machine
22

Installing Windows on a Virtual Machine

  • Loading Windows into a Virtual Machine
  • Understanding Configuration Options
  • Optimizing a New Virtual Machine
23

Installing Linux on a Virtual Machine

  • Loading Linux into a Virtual Machine
  • Understanding Configuration Options
  • Optimizing a New Linux Virtual Machine
24

Managing CPUs for a Virtual Machine

  • Understanding CPU Virtualization
  • Configuring VM CPU Options
  • Tuning Practices for VM CPUs
25

Managing Memory for a Virtual Machine

  • Understanding Memory Virtualization
  • Configuring VM Memory Options
  • Tuning Practices for VM Memory
26

Managing Storage for a Virtual Machine

  • Understanding Storage Virtualization
  • Configuring VM Storage Options
  • Tuning Practices for VM Storage
27

Managing Networking for a Virtual Machine

  • Understanding Network Virtualization
  • Configuring VM Network Options
  • Tuning Practices for Virtual Networks
28

Copying a Virtual Machine

  • Cloning a Virtual Machine
  • Working with Templates
  • Saving a Virtual Machine State
29

Managing Additional Devices in Virtual Machines

  • Using Virtual Machine Tools
  • Understanding Virtual Devices
  • Configuring a CD/DVD Drive
  • Configuring a Floppy Disk Drive
  • Configuring a Sound Card
  • Configuring USB Devices
  • Configuring Graphic Displays
  • Configuring Other Devices
30

Understanding Availability

  • Increasing Availability
  • Protecting a Virtual Machine
  • Protecting Multiple Virtual Machines
  • Protecting Data Centers
31

Understanding Applications in a Virtual Machine

  • Examining Virtual Infrastructure Performance Capabilities
  • Deploying Applications in a Virtual Environment
  • Understanding Virtual Appliances and vApps
  • Open Stack and Containers

1

The OSI Model and Encapsulation

  • Displaying the Structure of a UDP Segment
  • Displaying the Structure of a TCP Segment
2

Network Topologies and Types

  • Creating a Virtual Switch
3

Various Network Devices

  • Performing a Proxy Server Operation
4

Routing Technologies and Bandwidth Management

  • Configuring Directly Connected Routes
  • Configuring Static Routing
5

Ethernet Switching

  • Creating a VLAN and Viewing its Assignment to Port Mapping
  • Configuring an Access Port
  • Configuring and Viewing a Trunk Port Status
  • Configuring IP and Management Access
6

Organizational Documents and Policies

  • Configuring a Default Domain Password Policy
7

High Availability and Disaster Recovery

  • Configuring VRRP
8

Common Security Concepts

  • Examining Asymmetric Encryption
  • Performing Symmetric Encryption
  • Setting Up a Honeypot
9

Common Types of Attacks

  • Cracking a Password
  • Using SET
10

Network Hardening Techniques

  • Implementing Port Security
11

Remote Access Methods

  • Establishing a VPN Connection
scroll to top