免费一看一级欧美-免费一区二区三区免费视频-免费伊人-免费影片-99精品网-99精品小视频

課程目錄:Network Security Administrator培訓(xùn)
4401 人關(guān)注
(78637/99817)
課程大綱:

  Network Security Administrator培訓(xùn)

 

 

 

Module 1: Introduction to Network Security
Network topology; Network Types and the OSI Model
Module 2: Network Protocols
Network Protocols: SLIP; PPP; ARP; RARP; IGMP; ICMP; SNMP, HTTP
IP: Attacks and Countermeasures
TCP, UDP: Attacks and Countermeasures
FTP, TFTP, TELNET, SMTP: Vulnerabilities
Module 3: Security Policy
What is Security Policy?
What Defines a good security policy
Security Policy Structure
Developing and Implementing security policies
Requirements of Effective Security Policy
Module 4: Physical Security
Physical Security Threats
Locks and Keys
TEMPEST
Fire Safety: Fire Suppression, Gaseous Emission Systems
Laptop Security: Physical Security Countermeasures
Biometric Devices
PC Security: Boot Access
Module 5: Network Attacks
Current Statistics
Defining Terms: Threats, Attack and Exploit
Classification of Hackers and Attacks
Spoofing; Spamming; Eaves Dropping; Phishing; War Dialing; Password Cracking
Web Page Defacement; SQL Injection; Wire Tapping; Buffer Overflow
War Driving; War Chalking; War Flying
Denial of Service (DOS) Attacks and Distributed DOS
Module 6: Intrusion Detection System
Characteristics of IDS
Host based IDS Vs Network based IDS
IDS Detection Methods; Types of Signatures
Intrusion Prevention System
IDS Vs IPS
IPS Tool
Module 7: Firewalls
Handling threats and security tasks
Protection against hacking
Centralization and Documentation
Multi-layer firewall protection
Packet filtering and Stateful Packet Filtering
Multi firewall DMZ
Specialty firewalls and Reverse firewalls
Module8: Packet Filtering and Proxy Servers
Network Address Translation
Application layer gateway and Proxying
Virtual Private Network and the Authentication process
Module 9: Bastion Host and Honeypots
Bastion Host
Honeypots and Honeynet
Module 10: Hardening Routers
Internet work Operating Systems (IOS)
Troubleshooting a router
Hardening a Router
Components of router security
Router security: testing tools
Module 11: Hardening Operating Systems Security
Windows Security
Objects And Permissions
NTFS File System Permissions
Active Directory
Kerberos Authentication And Security
IP Security
Linux
Module 12: Patch Management
Red Hat Up2date Patch Management Utility Installation Steps
Microsoft Patch Management Process and Windows Update Services
Patch Management Tools: Qchain
Patch Management Tool: Microsoft Baseline Security Analyzer
Other Patch Management Tools
Module 13: Application Security
Securing Web Applications
IPSec And SSL Security
Writing Secure Code; Best Practices
Remote Administration Security
Module 14: Web Security
Network Devices and Design
Altering the Network Addresses
Client Authorization and Secure Client Transmissions
Portable Applications
Malicious Code Detection
Browser Security Settings
Common Gateway Interface (CGI)
Web Application Input Data Validation and Buffer Overflows
Module 15: E-Mail Security
Components Of An Email
E-mail protocols
E-Mail Security Risks
How to defend against E-Mail security risks
Module 16: Encryption
Firewalls Implementing Encryption
Maintaining confidentiality
Digital certificates
Public and Private Keys (including PGP)
Choosing the size of keys
Analyzing popular encryption schemes including IPSEC
Module 17: Virtual Private Networks
VPN Tunneling Protocols
PPTP and L2TP
VPN Security
Module 18: WLAN
Wireless Network Types
Antenna
WLAN Standards
BlueTooth And Ultra Wideband
WEP Description Tool (Air Snort and WEPCrack)
WLAN Security;WPA; TKIP; WTLS
EAP Methods
Advanced Encryption Standards (AES); DES; RSA Encryption
RADIUS; Multifactor Authentication
Mobile Security Through Certificates
Certificate Management Through PKI
Module 19: Creating Fault Tolerance
Network Security: Fault Tolerance
Why Create Fault Tolerance
Planning For Fault Tolerance
Reasons For System Failure
Preventive Measures
Module 20: Incident Response
What Is an Incident
Step by Step Procedure
Managing Incidents
What Is an Incident Response
Six Step Approach for Incident Handling (PICERF Methodology)
Incident Response Team
Module 21: Disaster Recovery and Planning
What is a Disaster Recovery
Disaster Recovery Planning
Business Continuity Planning Process
Disaster Prevention
Module 22: Network Vulnerability Assessment
Vulnerability Assessment
Goals of vulnerability assessment
Network vulnerability Assessment methodology:
Selecting vulnerability assessment tools

主站蜘蛛池模板: 日韩国产成人精品视频人 | 最近韩国日本免费 | 精品亚洲一区二区 | 国产小视频网站 | 99草在线观看 | 色综合视频在线观看 | 日韩一级高清 | 蜜柚视频 在线 | 2021久久天天躁狠狠躁夜夜 | 免费韩国一级毛片 | 成年人免费在线播放 | www福利视频| 亚洲成年男人的天堂网 | 99精品观看| 五月婷婷丁香花 | 亚洲不卡一区二区三区在线 | 亚洲动漫在线观看 | 久久精品欧美一区二区 | 欧美一区二区三区男人的天堂 | 精品国产一级毛片大全 | 国产又黄又a又潮娇喘视频 国产又粗又爽又大又长免费视 | 侠盗高飞免费完整版国语在线播放 | 两个人的视频在线观看 | 国产欧美第一页 | 自拍视频在线免费观看 | 致命弯道8在线观看高清免费观看 | 国产福利麻豆精品一区 | 2022国产精品福利在线观看 | 日韩欧美一区二区三区免费看 | 精品国产中文一级毛片在线看 | 天堂色 | 成人中文字幕在线 | 亚洲一区免费观看 | 乱一色一一区二区三区 | 黄网页在线观看 | 香蕉视频在线看 | 日本高清视频色wwwwww色 | 国产精品自产拍在线观看2019 | 日韩一级高清 | 国产精品自在在线香蕉 | 成人亚洲欧美日韩中文字幕 |