Network Security
1. Wi Fi security and its vulnerabilities
2. SSID (Service Set Identifier)
3. Network Monitoring
4. Patch Management
5. Password attacks — brute force, dictionary, credential stuffing
6. Man in the Middle (MITM) attack
7. Virtual Private Network (VPN)
8. controls/examples for integrity
9. Virtual Private Networks (VPNs)
10. Intrusion Prevention System (IPS)
11. Public Key Infrastructure (PKI)
12. basics of cryptography
13. Application Security
14. endpoint security
15. Access Control in network security
16. Data Security Layer
17. Endpoint Security in network security
18. Security Associations (SA)
19. Security Ontologies & Policy Modeling
20. Physical Layer Security (PHY Security)
21. Moving Target Defense (MTD)
22. Secure by Design Engineering
23. Deception Technology (Honeypots)
24. Microsegmentation
25. Network Behavior Anomaly Detection (NBAD)
26. Real Time Adaptive Security
27. Secure Routing
28. Zero Trust Architecture (ZTA)
29. QoS
30. Intrusion Detection
31. Public Key Infrastructure (PKI)
32. Hashing Algorithms
33. DMZ (Demilitarized Zone)
34. Unified Threat Management (UTM)
35. Principles of encryption
36. Encryption and integrity
37. Link layer encryption
38. Implementing encryption in networks
39. Hybrid systems
40. Vulnerability to attack
41. Asymmetric key systems
42. The components of a symmetric key system
43. An overview of symmetric key systems
44. Freshness
45. Tapping into transmission media
46. Potential network vulnerabilities
47. Important terminology and information for making the most of this section
48. Threats to communication networks
49. Network security when using your computer
50. Background to network security
51. Terminology and abbreviations
52. CIA Triad
53. Digital Signature
54. Hash Functions
55. asymmetric key encryption
56. symmetric key encryption
57. Defense in Depth (DiD) strategy
58. Network Security Architecture
59. network security models—Bell LaPadula, Biba, and Clark Wilson:
60. types of threats and attacks in network security:
61. Introduction
62. Network Security: Definition and Objectives:
63. Subnetting
64. Circuit level gateways
65. Application level gateways
66. Firewalls
67. Access control
68. Authentication