Network security
Overview
Encryption of files and firewalls are just some of the security measures that can be used in security. This free course, Network security, which assumes you have a substantial knowledge of ...
Syllabus
- Introduction
- Learning outcomes
- 1 Terminology and abbreviations
- 1 Terminology and abbreviations
- 1.1 Terminology
- 1.2 Abbreviations
- 2 Background to network security
- 2 Background to network security
- 2.1 Introduction
- 2.2 The importance of effective network security strategies
- 2.3 Network security when using your computer
- 3 Threats to communication networks
- 3 Threats to communication networks
- 3.1 How have network security measures developed over the past fifty years?
- 3.2 Important terminology and information for making the most of this section
- 3.3 Passive attacks
- 3.4 Active attacks
- 3.5 Potential network vulnerabilities
- 3.6 Tapping into transmission media
- 4 Principles of encryption
- 4 Principles of encryption
- 4.1 An introduction to encryption and cryptography
- 4.2 An overview of symmetric key systems
- 4.3 The components of a symmetric key system
- 4.4 Asymmetric key systems
- 4.5 Vulnerability to attack
- 4.6 Hybrid systems
- 5 Implementing encryption in networks
- 5 Implementing encryption in networks
- 5.1 Overview
- 5.2 Link layer encryption
- 5.3 End-to-end encryption
- 5.3.1 Network layer encryption
- 5.3.2 Application layer encryption
- 5.4 Link layer encryption and end-to-end encryption compared and combined
- 6 Integrity
- 6 Integrity
- 6.1 Encryption and integrity
- 6.2 Other ways of providing assurance of integrity
- 7 Freshness
- 7 Freshness
- 7.1 Introduction
- 7.2 Time stamps
- 7.3 Sequence numbers
- 7.4 Nonces
- 8 Authentication
- 8 Authentication
- 8.1 Overview of authentication methods
- 8.2 Certification authorities and digital certificates
- 9 Access control
- 9 Access control
- 9.1 Introduction
- 9.2 Passwords
- 9.3 Firewalls – an overview
- 9.4 Packet-filtering router
- 9.5 Application level gateways
- 9.6 Circuit level gateways
- 9.7 Examples of firewall implementation
- Conclusion
- 10.1 Summary of Sections 1–5
- 10.2 Summary of Sections 6–9
- References
- Acknowledgements
Taught by
F. Perry Wilson
Start The Class
OpenLearn
Free Online Course
English
Free Certificate Available
25 hours worth of material
On-Demand
Advanced