Network Security
1. controls/examples for integrity
2. symmetric key encryption
3. asymmetric key encryption
4. Hash Functions
5. Digital Signature
6. Secure Routing
7. Endpoint Security in network security
8. Data Security Layer
9. Access Control in network security
10. endpoint security
11. Application Security
12. basics of cryptography
13. Public Key Infrastructure (PKI)
14. Wi Fi security and its vulnerabilities
15. Virtual Private Networks (VPNs)
16. Defense in Depth (DiD) strategy
17. Virtual Private Network (VPN)
18. Man in the Middle (MITM) attack
19. Password attacks — brute force, dictionary, credential stuffing
20. Patch Management
21. Network Monitoring
22. SSID (Service Set Identifier)
23. Intrusion Prevention System (IPS)
24. Unified Threat Management (UTM)
25. DMZ (Demilitarized Zone)
26. Hashing Algorithms
27. Public Key Infrastructure (PKI)
28. Intrusion Detection
29. QoS
30. Link layer encryption
31. Terminology and abbreviations
32. Background to network security
33. Network security when using your computer
34. Threats to communication networks
35. Important terminology and information for making the most of this section
36. Potential network vulnerabilities
37. Tapping into transmission media
38. Principles of encryption
39. An overview of symmetric key systems
40. The components of a symmetric key system
41. Asymmetric key systems
42. Vulnerability to attack
43. Hybrid systems
44. Implementing encryption in networks
45. Introduction
46. Encryption and integrity
47. Freshness
48. Authentication
49. Access control
50. Firewalls
51. Application level gateways
52. Circuit level gateways
53. Subnetting
54. Network Security: Definition and Objectives:
55. CIA Triad
56. types of threats and attacks in network security:
57. network security models—Bell LaPadula, Biba, and Clark Wilson:
58. Network Security Architecture