Principles of Network Security

(CTU-CSS200.AB2)
Lessons
Lab
TestPrep
AI Tutor (Add-on)
Get A Free Trial

Skills You’ll Get

1

Introduction to Network Security

  • Introduction
  • The Basics of a Network
  • Basic Network Utilities
  • The OSI Model
  • Assessing Likely Threats to the Network
  • Classifications of Threats
  • Likely Attacks
  • Algorithms and Techniques Underlying Network Security
  • Choosing a Network Security Approach
  • Assessing Network Security Practices
  • Summary
2

Types of Attacks

  • Introduction
  • Understanding Denial of Service Attacks
  • Defending Against Buffer Overflow Attacks
  • Defending Against IP Spoofing
  • Defending Against Session Hijacking
  • Blocking Virus and Trojan Horse Attacks
  • Defending Against Email-Based Cyber Attacks
  • Summary
3

Fundamentals of Firewalls and it's Practical Applications

  • Introduction to Firewalls
  • What Is a Firewall?
  • Implementing Firewalls
  • Firewall Deployment
  • Selecting and Using a Firewall
  • Using Proxy Servers
  • Introduction to Firewall Practical Applications
  • Using Single Machine Firewalls
  • Windows 10 Firewall
  • User Account Control
  • Linux Firewalls
  • Using Small Office/Home Office Firewalls
  • Summary
4

Encryption Fundamentals

  • Introduction
  • Learning About Modern Encryption Methods
  • Identifying Good Encryption
  • Understanding Digital Signatures and Certificates
  • Understanding and Using Decryption
  • Cracking Passwords
  • Summary
5

Assessing System Security

  • Introduction
  • Risk Assessment Concepts
  • Evaluating the Security Risk
  • Conducting the Initial Assessment
  • Probing the Network
  • Vulnerabilities
  • Summary

1

Introduction to Network Security

  • Viewing the MAC Address on Different Interfaces
  • Examining Spyware
2

Types of Attacks

  • Defending Against a Buffer Overflow Attack
  • Conducting IP Spoofing
3

Fundamentals of Firewalls and it's Practical Applications

  • Using Windows Firewall
  • Configure User Access Control Settings
4

Encryption Fundamentals

  • Examining Asymmetric Encryption
  • Performing Symmetric Information
  • Cracking a Password using John the Ripper Tool
  • Using Rainbow Tables
5

Assessing System Security

  • Using OWASP ZAP
  • Conducting Vulnerability Scanning Using Nessus

Any questions?
Check out the FAQs

Still have unanswered questions and need to get in touch?

Contact Us Now

Related Courses

All Courses
scroll to top