Principles of Network Security

(CTU-CSS200.AB2)
Lessons
Lab
TestPrep
AI Tutor (Add-on)
Get A Free Trial

Skills You’ll Get

1

Introduction to Network Security

  • Introduction
  • The Basics of a Network
  • Basic Network Utilities
  • The OSI Model
  • Assessing Likely Threats to the Network
  • Classifications of Threats
  • Likely Attacks
  • Algorithms and Techniques Underlying Network Security
  • Choosing a Network Security Approach
  • Assessing Network Security Practices
  • Summary
2

Types of Attacks

  • Introduction
  • Understanding Denial of Service Attacks
  • Defending Against Buffer Overflow Attacks
  • Defending Against IP Spoofing
  • Defending Against Session Hijacking
  • Blocking Virus and Trojan Horse Attacks
  • Defending Against Email-Based Cyber Attacks
  • Summary
3

Fundamentals of Firewalls and it's Practical Applications

  • Introduction to Firewalls
  • What Is a Firewall?
  • Implementing Firewalls
  • Firewall Deployment
  • Selecting and Using a Firewall
  • Using Proxy Servers
  • Introduction to Firewall Practical Applications
  • Using Single Machine Firewalls
  • Windows 10 Firewall
  • User Account Control
  • Linux Firewalls
  • Using Small Office/Home Office Firewalls
  • Summary
4

Encryption Fundamentals

  • Introduction
  • Learning About Modern Encryption Methods
  • Identifying Good Encryption
  • Understanding Digital Signatures and Certificates
  • Understanding and Using Decryption
  • Cracking Passwords
  • Summary
5

Assessing System Security

  • Introduction
  • Risk Assessment Concepts
  • Evaluating the Security Risk
  • Conducting the Initial Assessment
  • Probing the Network
  • Vulnerabilities
  • Summary

1

Introduction to Network Security

  • Viewing the MAC Address on Different Interfaces
  • Analyzing Malware
2

Types of Attacks

  • Defending Against a Buffer Overflow Attack
  • Conducting IP Spoofing
3

Fundamentals of Firewalls and it's Practical Applications

  • Using Windows Firewall
  • Configure User Access Control Settings
4

Encryption Fundamentals

  • Examining Asymmetric Encryption
  • Performing Symmetric Information
  • Cracking a Password using John the Ripper Tool
  • Using Rainbow Tables
5

Assessing System Security

  • Using OWASP ZAP
  • Conducting Vulnerability Scanning Using Nessus

Related Courses

All Courses
scroll to top