Network security


Rating


Overview

Encryption of files and firewalls are just some of the security measures that can be used in security. This free course, Network security, which assumes you have a substantial knowledge of ...

Syllabus

  • Introduction
  • Learning outcomes
  • 1 Terminology and abbreviations
  • 1 Terminology and abbreviations
  • 1.1 Terminology
  • 1.2 Abbreviations
  • 2 Background to network security
  • 2 Background to network security
  • 2.1 Introduction
  • 2.2 The importance of effective network security strategies
  • 2.3 Network security when using your computer
  • 3 Threats to communication networks
  • 3 Threats to communication networks
  • 3.1 How have network security measures developed over the past fifty years?
  • 3.2 Important terminology and information for making the most of this section
  • 3.3 Passive attacks
  • 3.4 Active attacks
  • 3.5 Potential network vulnerabilities
  • 3.6 Tapping into transmission media
  • 4 Principles of encryption
  • 4 Principles of encryption
  • 4.1 An introduction to encryption and cryptography
  • 4.2 An overview of symmetric key systems
  • 4.3 The components of a symmetric key system
  • 4.4 Asymmetric key systems
  • 4.5 Vulnerability to attack
  • 4.6 Hybrid systems
  • 5 Implementing encryption in networks
  • 5 Implementing encryption in networks
  • 5.1 Overview
  • 5.2 Link layer encryption
  • 5.3 End-to-end encryption
  • 5.3.1 Network layer encryption
  • 5.3.2 Application layer encryption
  • 5.4 Link layer encryption and end-to-end encryption compared and combined
  • 6 Integrity
  • 6 Integrity
  • 6.1 Encryption and integrity
  • 6.2 Other ways of providing assurance of integrity
  • 7 Freshness
  • 7 Freshness
  • 7.1 Introduction
  • 7.2 Time stamps
  • 7.3 Sequence numbers
  • 7.4 Nonces
  • 8 Authentication
  • 8 Authentication
  • 8.1 Overview of authentication methods
  • 8.2 Certification authorities and digital certificates
  • 9 Access control
  • 9 Access control
  • 9.1 Introduction
  • 9.2 Passwords
  • 9.3 Firewalls – an overview
  • 9.4 Packet-filtering router
  • 9.5 Application level gateways
  • 9.6 Circuit level gateways
  • 9.7 Examples of firewall implementation
  • Conclusion
  • 10.1 Summary of Sections 1–5
  • 10.2 Summary of Sections 6–9
  • References
  • Acknowledgements

Taught by F. Perry Wilson 

Start The Class

 OpenLearn

 Free Online Course

 English

 Free Certificate Available

 25 hours worth of material

  On-Demand

  Advanced