Network Security
1. Wi Fi security and its vulnerabilities
2. Defense in Depth (DiD) strategy
3. symmetric key encryption
4. asymmetric key encryption
5. Hash Functions
6. Digital Signature
7. Secure Routing
8. Endpoint Security in network security
9. Data Security Layer
10. Access Control in network security
11. endpoint security
12. Application Security
13. basics of cryptography
14. Public Key Infrastructure (PKI)
15. Network Security Architecture
16. Virtual Private Networks (VPNs)
17. controls/examples for integrity
18. Virtual Private Network (VPN)
19. Man in the Middle (MITM) attack
20. Password attacks — brute force, dictionary, credential stuffing
21. Patch Management
22. Network Monitoring
23. SSID (Service Set Identifier)
24. Intrusion Prevention System (IPS)
25. Unified Threat Management (UTM)
26. DMZ (Demilitarized Zone)
27. Hashing Algorithms
28. Public Key Infrastructure (PKI)
29. Implementing encryption in networks
30. Terminology and abbreviations
31. Background to network security
32. Network security when using your computer
33. Threats to communication networks
34. Important terminology and information for making the most of this section
35. Potential network vulnerabilities
36. Tapping into transmission media
37. Principles of encryption
38. An overview of symmetric key systems
39. The components of a symmetric key system
40. Asymmetric key systems
41. Vulnerability to attack
42. Hybrid systems
43. Introduction
44. Link layer encryption
45. Encryption and integrity
46. Freshness
47. Authentication
48. Access control
49. Firewalls
50. Application level gateways
51. Circuit level gateways
52. Network Security: Definition and Objectives:
53. CIA Triad
54. types of threats and attacks in network security:
55. network security models—Bell LaPadula, Biba, and Clark Wilson: