|
This course covers the basic models used to conceptualize network communications, including the TCP/IP and OSI reference models. It provides information on the protocols used at each layer of the model and how hackers commonly exploit network protocols. It also explains how to perform security testing on existing and new systems.
Objectives:
- Describe the TCP/IP protocol stack
- Diagram the OSI reference model and explain how it functions
- List protocols used at the Network, Transport, and Application layers of each model
- Identify the major security vulnerabilities of network protocols
- List basic steps you can take to protect network services
- Identify the security vulnerabilities of e-mail servers
- Explain the processes used for security testing
Topics:
- TCP/IP security
- The OSI reference model
- Transport layer
- Application layer
- Implementing TCP/IP security
- Protecting TCP/IP services
- Simple Mail Transfer Protocol
- Testing and evaluating
- Security testing software
|
P500+ Processor, 128MB of RAM; Windows 2000, 2003, XP, Minimum screen resolution 800x600, Internet Explorer 5.5 or higher; Windows Media Player 9.0 or higher; Flash 8.0 or higher; 56K minimum connection; broadband (256 kpbs or higher) connection recommended; Javascript, DHTML and cookies enabled; Sound card with speakers or headphones strongly recommended.
|
Product names mentioned in this catalog may be trademarks/servicemarks or registered trademarks/servicemarks of their respective companies and are hereby acknowledged. All product names that are known to be trademarks or service marks have been appropriately capitalized. Use of a name in this catalog is for identification purposes only, and should not be regarded as affecting the validity of any trademark or service mark, or as suggesting any affiliation between MindLeaders.com, Inc. and the trademark/servicemark proprietor.
Terms of Use:
|
Copyright � 2006 Webteks. All rights reserved.
|
|
|