Monday, October 3, 2016

Communication and Network Security

Open Systems Interconnection Reference model

  1. Protocol
  2. Application Layer
  3. Presentation Layer
  4. Session Layer
  5. Transport Layer
  6. Network Layer
  7. Data Link Layer
  8. Physical Layer
  9. Functions and Protocols in the OSI Model
  10. Tying the Layers Together
  11. Multilayer Protocols

TCP/IP Model

  1. TCP
  2. IP Addressing
  3. IPv6
  4. Layer 2 Security Standards
  5. Converged Protocols

Types of Transmission

  1. Analog and Digital
  2. Asynchronous and Synchronous
  3. Broadband and Baseband

Cabling

  1. Coaxial Cable
  2. Twisted-Pair Cable
  3. Fibre-Optic Cable
  4. Cabling Problems

Networking Foundations

  1. Network Topology
  2. Media Access Technologies
  3. Transmission Methods
  4. Network Protocols and Services
  5. Domain Name Service
  6. E-mail Services
  7. Network Address Translation
  8. Routing Protocols

Networking Devices

  1. Repeaters
  2. Bridges
  3. Routers
  4. Switches
  5. Gateways
  6. PBXs
  7. Firewalls
  8. Proxy Servers
  9. Honeypot
  10. Unified Threat Management
  11. Content Distribution Networks
  12. Software Defined Networking

Intranets and Extranets
Metropolitan Area Networks

  1. Metro Ethernet

Wide Area Networks

  1. Telecommunications Evolution
  2. Dedicated Links
  3. WAN Technologies

Remote Connectivity

  1. Dial-up Connections
  2. ISDN
  3. DSL
  4. Cable Modems
  5. VPN
  6. Authentication Protocols

Wireless Networks

  1. Wireless Communication Techniques
  2. WLAN Components
  3. Evolution of WLAN Security
  4. Wireless Standards
  5. Best Practices for Securing WLANs
  6. Satellites
  7. Mobile Wireless Communication

Network Encryption

  1. Link Encryption vs. End-to-End Encryption
  2. E-mail Encryption
  3. Internet Security

Network Attacks

  1. Denial of Service
  2. Sniffing 
  3. DNS Hijacking 
  4. Drive-by Download