What You'll Learn
The online network security training program consists of 13 detailed lessons. Each course introduces a specific topic and the vital vocabulary that goes with it. Everything you learn is applicable in the real world, giving you the competitive edge you need to succeed. In addition, fun and challenging practice exercises enhance your understanding of such concepts as…
- How patch panels work
- The cable installation process
- Alternative ways to implement a firewall
- Types of encryption
- How to start and shut down computer services
Lesson 1: An Insecure World
Lesson 2: Under Attack
Primary types of security threats facing computer networks; the three broad classes of network security attacks; how a Denial of Service attack can bring down a network; hacker types; hardware security devices; approaches to network security; security resources.
Lesson 3: Hiding Behind Your Walls
Ring topology; ARCNet, FDDI and token networks; structured cable; horizontal cabling; fire ratings of network cable; how patch panels work; the cable installation process; advantages of a switched network; troubleshooting techniques; recent viruses and worms.
Lesson 4: Secret Codes & Honey Pots
What a firewall does; the four basic types of firewalls; alternative ways to implement a firewall; difference between a NAT and a proxy server; popular brands of firewalls; available services that firewalls offer.
Lesson 5: Securing the Ship
How intrusion detection systems work; popular IDS strategies; trapping hackers with a 'honey pot'; history of encryption; types of encryption; decryption technologies.
Lesson 6: Eliminating Worms & Spies
Encapsulation; how a VPN works; encryption protocols for VPN; IPSEC; creating users and groups in Windows 2003; the password policy; securing the registry of a Windows server; how to start and shut down computer services; encrypting files on a Windows computer; security templates.
Lesson 7: Assessing the Danger
How a virus spreads; well-known viruses, worms and virus hoaxes; virus scanning technologies; how to react to a network that is plagued by a virus; identifying a Trojan horse; the negative impact of spyware and adware on computers and how to alleviate these threats; anti-spyware applications.
Lesson 8: This is War
The components of a good user security policy; the makeup of a proper system administration policy and consequences of non-adherence; access control; the fundamentals of evaluating and assessing a network from a security point of view; how to probe a network for security weaknesses; documenting security evaluations.
Lesson 9: Hardening Network Infrastructure
FCC brands that are reserved for wireless LANs; assigned compliance specifications of the 802.11 standards and supplements; BBS vs IBBS; active and passive scanning; authentication and association; client station roaming across multiple access points; compensated wireless traffic for stations in power saving mode.
Lesson 10: You are the Gatekeeper
Criteria for evaluating a network design; six steps to ensuring security in a new network; the purpose, role and elements of a well-designed security policy; why security policies sometimes don't work in organizations.
Lesson 11: Auditing Your Security Policy
Advantages and disadvantages of server-based content filtering, client-based content filtering and gateway content filtering; implementing web content filtering; email, spam and virus filtering; multi-homed vs. dual firewalls; securing a network perimeter.
Lesson 12: Right Out of the Box
How to integrate VLANs into a network's security structure; modular components of an enterprise network design; reviewing security policy; performing a security audit; tools and utilities utilized in a security audit; justifying the cost of security.
Lesson 13: Under Lock & Key
Seven key tasks that every administrator needs to implement on day one; how and why to segment a network; best practices for segmenting a network; how firewalls and VLANs contribute to network segmentation.
Today's key cryptography choices; types of data that require encryption; encrypting databases; the points at which encryption takes place; encryption standards; IPSec; criteria for selecting an authentication method; using encryption to protect Internet traffic.
Close Curriculum Details
What You Get
Complete our network security training online on your terms. Start when you’re ready, study at your own pace and get personal guidance as you need it. We’ve removed the obstacles so you can move ahead fast!
Carefully selected online computer network security course content delivers both integral theoretical concepts and hands-on techniques. Your tuition covers:
- Comprehensive computer network security textbook and study guides
- Online, open-book exams
- Dedicated academic support and tutoring
- Participation in the Student Community
- Career Services powered by CareerBuilder®
Graduates of our online network security course receive a personalized diploma and may attend our annual graduation ceremony.
We’ve cleared the way. Start your Computer Network Security training today. Speak with an Admissions Advisor at 1-800-957-5412 or enroll online now.