Network Security Essentials
Discover the core fundamentals of network security and prepare to launch best defense strategies for safeguarding your network.
(NET-SEC-ESS.AP1) / ISBN : 978-1-64459-443-8About This Course
This Network Security Essentials course offers a detailed introduction to the core principles and foundational knowledge of network protection. You’ll gain relevant insights for identifying the CIA triad (Confidentiality, Integrity, Availability) and its significance in network security. You’ll be exploring various security services and cryptography techniques to safeguard your data. Prepare yourself for the industry-certification with this all-inclusive course that offers hands-on-labs to solidify your fundamentals.
Skills You’ll Get
- Understanding common network threats and vulnerabilities
- Identifying malware, phishing attacks, denial-of-service (DoS) attacks, etc.
- Explore CIA triads including Confidentiality, Integrity, Availability
- Implementing security practices like authentication, authorization, access control, non-repudiation, and data encryption
- Accessing security tools like firewalls, IDS, IPS, and VPN
- Using basic cryptographic concepts for securing data.
- Ability to secure different network layers (physical, data link, network, transport, application).
Get the support you need. Enroll in our Instructor-Led Course.
Interactive Lessons
28+ Interactive Lessons | 58+ Exercises | 258+ Quizzes | 282+ Flashcards | 282+ Glossary of terms
Gamified TestPrep
3+ Pre Assessment Questions | 5+ Post Assessment Questions |
Hands-On Labs
28+ LiveLab | 28+ Video tutorials | 01:07+ Hours
Preface
- What’s New in the Sixth Edition
- Objectives
- Support of ACM/IEEE Computer Science Curricula 2013
- Plan of the Text
- Projects and other Student Exercises
- Relationship to Cryptography and Network Security
- Acknowledgments
Introduction
- Computer Security Concepts
- The OSI Security Architecture
- Security Attacks
- Security Services
- Security Mechanisms
- Fundamental Security Design Principles
- Attack Surfaces and Attack Trees
- A Model for Network Security
- Standards
- Review Questions, and Problems
Symmetric Encryption and Message Confidentiality
- Symmetric Encryption Principles
- Symmetric Block Encryption Algorithms
- Random and Pseudorandom Numbers
- Stream Ciphers and RC4
- Cipher Block Modes of Operation
- Review Questions, and Problems
Public-Key Cryptography and Message Authentication
- Approaches to Message Authentication
- Secure Hash Functions
- Message Authentication Codes
- Public-Key Cryptography Principles
- Public-Key Cryptography Algorithms
- Digital Signatures
- Review Questions, and Problems
Key Distribution and User Authentication
- Remote User Authentication Principles
- Symmetric Key Distribution Using Symmetric Encryption
- Kerberos
- Key Distribution Using Asymmetric Encryption
- X.509 Certificates
- Public-Key Infrastructure
- Federated Identity Management
- Review Questions, and Problems
Network Access Control and Cloud Security
- Network Access Control
- Extensible Authentication Protocol
- IEEE 802.1X Port-Based Network Access Control
- Cloud Computing
- Cloud Security Risks and Countermeasures
- Data Protection in the Cloud
- Cloud Security as a Service
- Addressing Cloud Computing Security Concerns
- Review Questions, and Problems
Transport-Level Security
- Web Security Considerations
- Transport Layer Security
- HTTPS
- Secure Shell (SSH)
- Review Questions, and Problems
Wireless Network Security
- Wireless Security
- Mobile Device Security
- IEEE 802.11 Wireless LAN Overview
- IEEE 802.11i Wireless LAN Security
- Review Questions, and Problems
Electronic Mail Security
- Internet Mail Architecture
- E-mail Formats
- E-mail Threats and Comprehensive E-mail Security
- S/MIME
- Pretty Good Privacy
- DNSSEC
- DNS-Based Authentication of Named Entities
- Sender Policy Framework
- Domainkeys Identified Mail
- Domain-Based Message Authentication, Reporting, and Conformance
- Review Questions, and Problems
IP Security
- Ip Security Overview
- Ip Security Policy
- Encapsulating Security Payload
- Combining Security Associations
- Internet Key Exchange
- Cryptographic Suites
- Review Questions, And Problems
Malicious Software
- Types of Malicious Software (Malware)
- Advanced Persistent Threat
- Propagation—Infected Content—Viruses
- Propagation—Vulnerability Exploit—Worms
- Propagation—Social Engineering—Spam e-mail, Trojans
- Payload—System Corruption
- Payload—Attack Agent—Zombie, Bots
- Payload—Information Theft—Keyloggers, Phishing, Spyware
- Payload—Stealthing—Backdoors, Rootkits
- Countermeasures
- Distributed Denial of Service Attacks
- Review Questions, and Problems
Intruders
- Intruders
- Intrusion Detection
- Password Management
- Review Questions, and Problems
Firewalls
- The Need for Firewalls
- Firewall Characteristics and Access Policy
- Types of Firewalls
- Firewall Basing
- Firewall Location and Configurations
- Review Questions, and Problems
Network Management Security
- Basic Concepts of SNMP
- SNMPv1 Community Facility
- SNMPv3
- Recommended Reading
- References
- Review Questions, and Problems
Legal and Ethical Aspects
- Cybercrime and Computer Crime
- Intellectual Property
- Privacy
- Ethical Issues
- Recommended Reading
- References
- Review Questions, and Problems
SHA-3
- The Origins of SHA-3
- Evaluation Criteria for SHA-3
- The Sponge Construction
- The SHA-3 Iteration Function f
- Recommended Reading and Referencess
- Review Questions, and Problems
Appendix A: Some Aspects of Number Theory
- Prime and Relatively Prime Numbers
- Modular Arithmetic
Appendix B: Projects for Teaching Network Security
- Research Projects
- Hacking Project
- Programming Projects
- Laboratory Exercises
- Practical Security Assessments
- Firewall Projects
- Case Studies
- Writing Assignments
- Reading/Report Assignments
Appendix C: Standards and Standard-Setting Organizations
- The Importance of Standards
- Internet Standards and the Internet Society
- The National Institute of Standards and Technology
- The International Telecommunication Union
- The International Organization for Standardization
- Significant Security Standards and Documents
Appendix D: TCP/IP and OSI
- Protocols And Protocol Architectures
- The TCP/IP Protocol Architecture
- The Role Of An Internet Protocol
- IPV4
- IPV6
- The OSI Protocol Architecture
Appendix E: Pseudorandom Number Generation
- Prng Requirements
- Pseudorandom Number Generation Using a Block Cipher
- Pseudorandom Number Generation Using Hash Functions and MACs
Appendix F: Kerberos Encryption Techniques
- Password-To-Key Transformation
- Propagating Cipher Block Chaining Mode
Appendix G: Data Compression Using ZIP
- Compression Algorithm
- Decompression Algorithm
Appendix H: PGP
- Notation
- Operational Description
- Cryptographic Keys And Key Rings
- Public-Key Management
- Pgp Random Number Generation
Appendix I: The International Reference Alphabet
Appendix J: The Base Rate Fallacy
- Conditional Probability and Independence
- Bayes’ Theorem
- The Base-Rate Fallacy Demonstrated
- References
Appendix K: Radix-64 Conversion
References
Symmetric Encryption and Message Confidentiality
- Configuring a Wireless AP
- Establishing a SSH Connection
- Observing a SHA256-Generated Hash Value
- Examining Asymmetric Encryption
- Observing an MD5-Generated Hash Value
- Generating a Symmetric Key
- Performing Symmetric Encryption
Key Distribution and User Authentication
- Examining Kerberos Settings
- Examining PKI Certificates
Wireless Network Security
- Exploiting SNMP
- Securing a Wi-Fi Hotspot
- Creating a Network Policy for 802.1X
- Using a Wireless AP for MAC Address Filtering
Electronic Mail Security
- Configuring DNS Information
IP Security
- Configuring an IPsec Policy
Malicious Software
- Creating a Remote Access Trojan (RAT)
- Installing Antivirus Software
- Configuring IPSec
- Testing an Antivirus Program
- Simulating a DoS Attack
- Simulating a DDoS Attack
Intruders
- Understanding Local Privilege Escalation
- Setting Up a Honeypot
Firewalls
- Using Windows Firewall
- Whitelisting an IP Address in the Windows Firewall
- Creating Outbound and Inbound Rules for a Firewall
Network Management Security
- Configuring SNMPv2c
- Configuring SNMPv3
Any questions?Check out the FAQs
Still have unanswered questions and need to get in touch?
Contact Us NowThis course is based on the core fundamentals of secure networks. It equips you with the knowledge required for identifying potential cyber threats and implementing hi-tech security measures to safeguard your network.
This course upgrades your existing IT skills, teaches you the core concepts of network security, and also prepares you for high-paying jobs in the field of network security.
Considering the ever-evolving landscape of cyber threats worldwide, there’s a very high demand for trained workforce in this realm. In the current job scenario, it is recognised as one of the most promising career opportunities with significant growth potential.
With uCertify, you'll have access to various support options throughout the course, such as 24/7 support team, hands-on network security labs, gamified testpreps, video tutorials, and more.
You can access assignments/testpreps/practice exams along with uCertify course materials.