The following topics are covered: Network Security Background; What Is Security?; Hacker Statistics; The Myth of 100-Percent Security; Attributes of an Effective Security Matrix; What You Are Trying to Protect; Who Is the Threat?; and Security Standards.
The following topics are covered: Security Elements and Mechanisms; The Security Policy; Determining Backups; Encryption; Authentication; Specific Authentication Techniques; Access Control; Auditing; and Security Tradeoffs and Drawbacks.
The following topics are covered: Reasons to Use Encryption; Creating Trust Relationships; Symmetric-Key Encryption; Symmetric Algorithms; Asymmetric-Key Encryption; One-Way (Hash) Encryption; Applied Encryption Processes; and Encryption Review.
The following topics are covered: Network Attack Categories; Brute-Force and Dictionary Attacks; System Bugs and Back Doors; Malware (Malicious Software); Social Engineering Attacks; Denial-of-Service (DOS) Attacks; Distributed Denial-of-Service (DDOS) Attacks; Spoofing Attacks; Scanning Attacks; Man-in-the-Middle Attacks; Bots and Botnets; SQL Injection; and Auditing.
The following topics are covered: Networking Vulnerability; Considerations; Wireless Network Technologies and Security; IEEE 802.11 Wireless Standards; Wireless Networking Modes; Wireless Application Protocol (WAP); Wireless Network Security Problems; Wireless Network Security; Solutions; Site Surveys; Convergence Networking and Security; Web 2.0 Technologies; Greynet Applications; Vulnerabilities with Data at Rest; Security Threats from Trusted Users; and Anonymous Downloads and Indiscriminate Link-Clicking
The following topics are covered: Common Security Principles; Be Paranoid; You Must Have a Security Policy; No System or Technique Stands Alone; Minimize the Damage; Deploy Companywide Enforcement; Provide Training; Use an Integrated Security Strategy; Place Equipment According to Needs; Identify Security Business Issues; and Consider Physical Security.
The following topics are covered: TCP/IP Security Introduction; OSI Reference Model Review; Data Encapsulation; The TCP/IP Stack and the OSI Reference Model; Link/Network Access Layer; Network/Internet Layer; Transport Layer; Application Layer; and Protocol Analyzers.
The following topics are covered: TCP/IP Security Vulnerabilities; Implementing Security; Resources and Services; Protecting TCP/IP Services; Simple Mail Transfer Protocol (SMTP); Physical Security; Testing Systems; Security Testing Software; and Security and Repetition.
The following topics are covered: Access Control Overview; Definition and Description of a Firewall; The Role of a Firewall; Firewall Terminology; Firewall Configuration Defaults; Creating Packet Filter Rules; Packet Filter Advantages and Disadvantages; Configuring Proxy Servers; URL Filtering; Remote Access and Virtual Private Networks (VPNs); and Public Key Infrastructure (PKI).
The following topics are covered: Designing a Firewall; Types of Bastion Hosts; Hardware Issues; Common Firewall Designs; and Putting It All Together.
The following topics are covered: Proactive Detection; Distracting the Hacker; and Deterring the Hacker.
The following topics are covered: Creating an Incident Response Policy; Determining If an Attack Has Occurred; Executing the Response Plan; and Analyzing and Learning.