Network Security

  • Instructor: mrweb
  • Duration: 10 weeks

Inquire now to Get Huge Discount

Choose Course

In this modern era, organizations greatly rely on computer networks to share information throughout the organization in an efficient and productive manner. Organizational computer networks are now becoming large and ubiquitous. Assuming that each staff member has a dedicated workstation, a large scale company would have few thousands workstations and many server on the network.

It is likely that these workstations may not be centrally managed, nor would they have perimeter protection. They may have a variety of operating systems, hardware, software, and protocols, with different level of cyber awareness among users. Now imagine, these thousands of workstations on company network are directly connected to the Internet. This sort of unsecured network becomes a target for an attack which holds valuable information and displays vulnerabilities.

In this chapter, we describe the major vulnerabilities of the network and significance of network security. In subsequent chapters, we will discuss the methods to achieve the same.

  • Network Topology 0/0

    No items in this section
  • Open systems Interconnectivity Model 0/0

    No items in this section
  • TCP/IP IN-depth 0/0

    No items in this section
  • WAP, NAT, DNS, and ICMP 0/0

    No items in this section
  • Internet Routing 0/0

    No items in this section
  • Advance Port Scanning 0/0

    No items in this section
  • Sniffing Attacks 0/0

    No items in this section
  • Masquerading Attacks 0/0

    No items in this section
  • Advance DOS and DDOS 0/0

    No items in this section
  • Session Hijacking Attacks 0/0

    No items in this section
  • Network Operations Centre - Security 0/0

    No items in this section
  • Network Traffic Analysis 0/0

    No items in this section
  • Network Vulnerability Assessment 0/0

    No items in this section
  • Network Penetration Testing 0/0

    No items in this section
  • Intrusion Detection System 0/0

    No items in this section
  • Solar Winds 0/0

    No items in this section
  • Glasswire 0/0

    No items in this section
  • Intrusion Detection System 0/0

    No items in this section
  • Firewalls (Installation,Configuration, and Usage) 0/0

    No items in this section
  • OS Hardening for Networks- Linux and Windows 0/0

    No items in this section
  • Cryptography - Introduction 0/0

    No items in this section
  • Symmetric Key Encryption 0/0

    No items in this section
  • Asymmetric Key Encryption 0/0

    No items in this section
  • Hash functions 0/0

    No items in this section
  • Trust models 0/0

    No items in this section
  • VLAN- Security 0/0

    No items in this section
  • VPN- Security 0/0

    No items in this section
  • Wireless Networks- Introduction 0/0

    No items in this section
  • Radio frequency Essentials 0/0

    No items in this section
  • Wireless Security- Basics 0/0

    No items in this section
  • Wireless Threats 0/0

    No items in this section
  • Attacking Wireless Hotspot and Security 0/0

    No items in this section
  • WEP Security 0/0

    No items in this section
  • WPA/WPA2 Security 0/0

    No items in this section
  • Secure Wireless Infrastructre Deployment 0/0

    No items in this section
  • DNS Tunneling 0/0

    No items in this section
Admin bar avatar
Founder
X