topic we will be covered:-
- confidentiality, integrity, availabili
- Overview of Network Security
- Perimeter Security
- Access Control
- Device Security
- Security features on Switches
- Firewall, Types of firewall
- Attack vector and Mitigation techniques
- Access Management
- Threat
- Vulnerabilities – vulnerability assessment and vulnerability scanning
- Attacks – Application Attack, Network Attack and Mitigating & Deterring Attacks
- Network Security
- Security through network devices,
- Security through Network Technologies and Security through Network Design Elements
- Administering a Secure Network
- Network Administrative Principles and Securing Network Application.
- security policies, security mechanisms, assurance
- Cryptography
- Network Intrusion Prevention
- Overview of Intrusion Prevention System (IPS)
- Intrusion Detection System (IDS)
- Deploying IPS and IPS High Availability
- Host Intrusion Prevention
- Anomaly Detection and Mitigation
- Historical background
- Transposition/Substitution
- Caesar Cipher
- Introduction to Symmetric crypto primitives
- Asymmetric crypto primitives
- Hash functions
- Security Monitoring and correlation
- Security Management
- Security and Policy Management and Security Framework and Regulatory Compliance
- Best Practices Framework
- Case Studies
- Secret Key Cryptography
- Data Encryption Standard (DES)
- Encrypting large messages (ECB, CBC, OFB, CFB, CTR)
- Multiple Encryption DES (EDE)
- Message Digests
- Strong and weak collision resistance
- The Birthday Paradox
- SHA-1
- Public Key Cryptography
- Euclidean algorithm,
- Euler Theorem,
- Fermat Theorem
- Torrent functions
- multiplicative and additive inverse
- RSA,
- Selection of public and private keys Midterm
- Authentication
- Security Handshake pitfalls
- Online vs. offline password guessing
- Reflection attacks
- Per-session keys and authentication tickets
- Key distribution centers and certificate authorities
- Trusted Intermediaries
- Public Key infrastructures
- Certification authorities and key distribution centers
- Kerberos
- Real-time Communication Security
- Introduction to TCP/IP protocol stack
- Implementation layers for security protocols and implications
- IPsec: AH and ESP
- IPsec: IKE
- SSL/TLS
- virtual private network(vpn)
- Electronic Mail Security
- Distribution lists
- Establishing keys
- Privacy,
- source authentication,
- message integrity,
- non-repudiation,
- proof of submission,
- proof of delivery,
- message flow confidentiality,
- anonymity
- Pretty Good Privacy (PGP)
- Packet filters
- Application level gateways
- Encrypted tunnels
- Cookies
- Web security problems
Comments
Post a Comment
thank you for visiting :)