Course Introduction-Course Introduction
Course Introduction
()
Course Agenda
Network Concepts and Models-Network Concepts and Models
What is Networking?
()
What is Networking?
Networking at a Glance
Networking Models
Network Models- Comparison
()
Open Systems Interconnection (OSI) Model
Transmission Control Protocol/Internet Protocol (TCP/IP)
Layers 1 and 2 – Physical Layer
()
Layer 3 – Network Layer
()
Layer 4 – Transport Layer
()
Layer 5 – Session Layer
()
Internet Protocol (IPv4 and IPv6)
What is WiFi?
Security of the Network
Ports and Protocols (Applications/Services)
Secure Ports
Common Network Threats and Attacks-Common Network Threats and Attacks
Spoofing, Phishing, DOS
()
Virus, Worm, Trojans, On-Path Attack
()
Side-Channel Attack
()
Types of Threats
Identify Threats and Tools Used to Prevent Them
Intrusion Detection System (IDS)
Host Intrusion Prevention Systems
()
Preventing Threats
Network Security Infrastructure-Network Security Infrastructure
Data Center
()
On-Premises Data Centers
Redundancy
Cloud Services
()
Infrastructure as a Service (IaaS)
()
Cloud
Cloud Characteristics
Service Models
Deployment Models
Managed Service Provider (MSP)
Service-Level Agreement (SLA)
Network Design
Defense in Depth
Zero Trust
Network Access Control (NAC)
Network Segmentation (Demilitarized Zone (DMZ))
Segmentation for Embedded Systems and IoT
Micro-Segmentation
Virtual Local Area Network (VLAN)
Virtual Private Network (VPN)
Network Security Review-Network Security Review
Network Security Review
()
Course Summary
Terms and Definitions
Network Security Quiz
()