Network Security
1. endpoint security
2. types of threats and attacks in network security:
3. network security models—Bell LaPadula, Biba, and Clark Wilson:
4. Network Security Architecture
5. Defense in Depth (DiD) strategy
6. symmetric key encryption
7. asymmetric key encryption
8. Hash Functions
9. Digital Signature
10. Secure Routing
11. Endpoint Security in network security
12. Data Security Layer
13. Access Control in network security
14. CIA Triad
15. Application Security
16. basics of cryptography
17. Public Key Infrastructure (PKI)
18. Wi Fi security and its vulnerabilities
19. Virtual Private Networks (VPNs)
20. controls/examples for integrity
21. Virtual Private Network (VPN)
22. Man in the Middle (MITM) attack
23. Password attacks — brute force, dictionary, credential stuffing
24. Patch Management
25. Network Monitoring
26. Vulnerability to attack
27. Terminology and abbreviations
28. Background to network security
29. Network security when using your computer
30. Threats to communication networks
31. Important terminology and information for making the most of this section
32. Potential network vulnerabilities
33. Tapping into transmission media
34. Principles of encryption
35. An overview of symmetric key systems
36. The components of a symmetric key system
37. Asymmetric key systems
38. Introduction
39. Hybrid systems
40. Implementing encryption in networks
41. Link layer encryption
42. Encryption and integrity
43. Freshness
44. Authentication
45. Access control
46. Firewalls
47. Application level gateways
48. Circuit level gateways
49. Network Security: Definition and Objectives: