Introduction
Welcome
()
What you need to know
()
1. TCP/IP Suite
Introducing TCP/IP
()
IP addresses
()
Domain name service
()
Network ports
()
ICMP
()
2. Network Security Devices
Routers, switches, and bridges
()
Firewalls
()
Proxies
()
Load balancers
()
VPNs and VPN concentrators
()
IPsec
()
Network intrusion detection and prevention
()
Unified threat management
()
OpenID Connect
()
3. Managing Secure Networks
Firewall rule management
()
Router configuration security
()
Switch configuration security
()
Maintaining network availability
()
Network monitoring
()
SNMP
()
Storage networks
()
4. Wireless Networking
Wireless networking
()
Basic wireless security
()
WEP, WPA, and WPA2
()
Wireless authentication
()
Wireless signal propagation
()
Wireless networking equipment
()
5. Security and Monitoring Technologies
Correlating security information
()
Tuning and configuring SIEMs
()
Continuous security monitoring
()
Data loss prevention
()
Network access control
()
Mail gateways
()
Data sanitization tools
()
Steganography
()
6. Security Assessment Tools
Protocol analyzers
()
Network scanning
()
Exploitation frameworks
()
Command line network tools
()
DNS harvesting
()
7. Security Troubleshooting
Troubleshooting authentication and authorization
()
Troubleshooting digital certificates
()
Troubleshooting device configurations
()
Change and configuration management
()
Physical asset management
()
8. Personnel Security
Personnel security
()
Security in the hiring process
()
Employee termination process
()
Employee privacy
()
Social networking
()
Personnel safety
()
9. Host Security
Operating system security
()
Malware prevention
()
Application management
()
Host-based network security controls
()
File integrity monitoring
()
Removable media control
()
Data execution prevention
()
10. Mobile Device Security
Mobile connection methods
()
Mobile device security
()
Mobile device management
()
Mobile device tracking
()
Mobile application security
()
Mobile security enforcement
()
Bring your own device
()
Mobile deployment models
()
11. Securing Protocols
TLS and SSL
()
Protocol security use cases
()
Securing common protocols
()
Cryptographic hardware
()