home       ENT1       ENT2       RnS3       RnS4       SEC1       SEC2      

11.2 Network Security

11.2.1 Security Threats and Vulnerabilities

  • 11.2.1.1 Types of Threats
  • 11.2.1.2 Physical Security
  • 11.2.1.3 Types of Vulnerabilities
  • 11.2.1.4 Activity - Security Threats and Vulnerabilities

11.2.2 Network Attacks

  • 11.2.2.1 Types of Malware
  • 11.2.2.2 Reconnaissance Attacks
  • 11.2.2.3 Access Attacks
  • 11.2.2.4 Denial of Service Attacks
  • 11.2.2.5 Activity - Types of Attack
  • 11.2.2.6 Lab - Researching Network Security Threats

11.2.3 Network Attack Mitigation

  • 11.2.3.1 Backup, Upgrade, Update, and Patch
  • 11.2.3.2 Authentication, Authorization, and Accounting
  • 11.2.3.3 Firewalls
  • 11.2.3.4 Endpoint Security

11.2.4 Device Security

  • 11.2.4.1 Device Security Overview
  • 11.2.4.2 Passwords
  • 11.2.4.3 Basic Security Practices
  • 11.2.4.4 Enable SSH
  • 11.2.4.5 Packet Tracer - Configuring Secure Passwords and SSH
  • 11.2.4.6 Lab - Accessing Network Devices with SSH
  • 11.2.4.7 Lab - Examining Telnet and SSH in Wireshark
  • 11.2.4.8 Lab - Securing Network Devices