• Bài giảng Security+ Guide to Network Security Fundamentals - Chapter 4: Security BaselinesBài giảng Security+ Guide to Network Security Fundamentals - Chapter 4: Security Baselines

    Summary • Establishing a security baseline creates a basis for information security • Hardening the operating system involves applying the necessary updates to the software • Securing the file system is another step in hardening a system

    pdf39 trang | Chia sẻ: vutrong32 | Ngày: 16/10/2018 | Lượt xem: 1141 | Lượt tải: 0

  • Bài giảng Security+ Guide to Network Security Fundamentals - Chapter 3: Security BasicsBài giảng Security+ Guide to Network Security Fundamentals - Chapter 3: Security Basics

    Summary • Creating and maintaining a secure environment cannot be delegated to one or two employees in an organization • Major tasks of securing information can be accomplished using a bottom-up approach, where security effort originates with low-level employees and moves up the organization chart to the CEO • In a top-down approach, the effor...

    pdf38 trang | Chia sẻ: vutrong32 | Ngày: 16/10/2018 | Lượt xem: 1111 | Lượt tải: 0

  • Bài giảng Security+ Guide to Network Security Fundamentals - Chapter 2: Attackers and Their AttacksBài giảng Security+ Guide to Network Security Fundamentals - Chapter 2: Attackers and Their Attacks

    Summary • Six categories of attackers: hackers, crackers, script kiddies, spies, employees, and cyberterrorists • Password guessing is a basic attack that attempts to learn a user’s password by a variety of means • Cryptography uses an algorithm and keys to encrypt and decrypt messages

    pdf46 trang | Chia sẻ: vutrong32 | Ngày: 16/10/2018 | Lượt xem: 1074 | Lượt tải: 0

  • Bài giảng Security+ Guide to Network Security Fundamentals - Chapter 1: Information Security FundamentalsBài giảng Security+ Guide to Network Security Fundamentals - Chapter 1: Information Security Fundamentals

    Summary • The challenge of keeping computers secure is becoming increasingly difficult • Attacks can be launched without human intervention and infect millions of computers in a few hours • Information security protects the integrity, confidentiality, and availability of information on the devices that store, manipulate, and transmit the inform...

    pdf26 trang | Chia sẻ: vutrong32 | Ngày: 16/10/2018 | Lượt xem: 1094 | Lượt tải: 0

  • Chapter 15: SSL VPNs with Cisco ASAChapter 15: SSL VPNs with Cisco ASA

    The key points covered in this chapter are as follows: • Market trends drive the need for effective remote-access security and present challenges to the IT organization. • The SSL protocol uses the cryptology concepts presented in this chapter. • Cisco SSL VPN solutions include clientless and full client tunnel modes of operation. • Cisco SSL ...

    pptx47 trang | Chia sẻ: vutrong32 | Ngày: 16/10/2018 | Lượt xem: 1152 | Lượt tải: 0

  • Chapter 14: Site-To-Site IPsec VPNs with Cisco IOS RoutersChapter 14: Site-To-Site IPsec VPNs with Cisco IOS Routers

    IOS-FW# show crypto isakmp policy Global IKE policy Protection suite of priority 1 encryption algorithm: Three key triple DES hash algorithm: Secure Hash Standard authentication method: Pre-Shared Key Diffie-Hellman group: #2 (1024 bit) lifetime: 86400 seconds, no volume limit

    pptx28 trang | Chia sẻ: vutrong32 | Ngày: 16/10/2018 | Lượt xem: 1086 | Lượt tải: 0

  • Chapter 13: IPsec FundamentalsChapter 13: IPsec Fundamentals

    IPv6 VPNs • IPsec is mandatory for IPv6. • IPsec is native to IPv6. • Includes built-in confidentiality, integrity, authentication, and antireplay. • Offers flexibility and low overhead through extension headers. • The IPsec framework and behavior are the same as IPsec for IPv4. • Strong encryption (Suite B) and mobility enhancements (IKEv2) ...

    pptx34 trang | Chia sẻ: vutrong32 | Ngày: 16/10/2018 | Lượt xem: 1119 | Lượt tải: 0

  • Chapter 12: Fundamentals of Cryptography and VPN TechnologiesChapter 12: Fundamentals of Cryptography and VPN Technologies

    The key points covered in this chapter are as follows: • A cryptosystem is made up of a combination of hashing, symmetric, and asymmetric algorithms. • Symmetric algorithms use a single key for encrypting and decrypting. Generally speaking, symmetric algorithms are the strongest and fastest algorithms and therefore are used for most encryption. ...

    pptx77 trang | Chia sẻ: vutrong32 | Ngày: 16/10/2018 | Lượt xem: 1141 | Lượt tải: 0

  • Chapter 11: Intrusion Prevention SystemsChapter 11: Intrusion Prevention Systems

    Configuring Cisco IOS IPS Using the CLI Router(config)# ip ips name sdm_ips_rule Router(config)# ip ips config location flash:/ips/retries 1 Router(config)# ip ips notify SDEE Router(config)# interface FastEthernet0/0 Router(config-if)# ip ips sdm_ips_rule in To configure the router to support the default basic signature set, use the ip ips s...

    pptx66 trang | Chia sẻ: vutrong32 | Ngày: 16/10/2018 | Lượt xem: 1133 | Lượt tải: 0

  • Chapter 10: Cisco Firewalling Solutions: Cisco IOS Zone-Based Firewall and Cisco ASAChapter 10: Cisco Firewalling Solutions: Cisco IOS Zone-Based Firewall and Cisco ASA

    Packet Tracer Tool To open the Packet Tracer, perform the following steps: Step 1. In the main Cisco ASDM application window, navigate to Tools > Packet Tracer. Step 2. The Cisco ASDM Packet Tracer dialog box opens. Step 3. Choose the source interface for the packet trace from the Interface drop-down list. Step 4. Specify the protocol type fo...

    pptx85 trang | Chia sẻ: vutrong32 | Ngày: 16/10/2018 | Lượt xem: 1166 | Lượt tải: 0