This course will walk you through the intricacies of defending your network against attacks. It begins with a brief introduction to the field of network security and explains the threats to a network--including denial of service attacks, buffer overflow attacks, and viruses. Students will study details on various security technologies including firewalls, intrusion-detection systems, and VPNs. These items are the core of any network's security, so a significant portion of this book is devoted to ensuring the reader fully understands both the concepts behind them and the practical applications. In every case, practical direction for selecting appropriate technology for a given network is included.
This course also provides a solid introduction to encryption. This topic is critical because ultimately computer systems are simply devices for storing, transmitting, and manipulating data. No matter how secure the network is, if the data it transmits is not secure then there is a significant danger. Next, students will study operating system hardening and examine specific defense strategies and techniques to guard against the most common network dangers. Finally, students will gain an introduction to security policies and learn to do an assessment of a network's security by studying guidelines for examining policies as well as an overview of network assessment tools.
- Explain the intricacies of defending a network against attacks
- Discuss threats to networks, including denial of service, buffer overflows and viruses
- Describe various security technologies such as firewalls, intrusion-detection systems and VPNs
- Summarize encryption as a defense system
- Identify specific defense strategies and techniques against common network dangers
- Outline how to do an assessment of a network security