11.2 Network Security
11.2.1 Security Threats and Vulnerabilities
- 11.2.1.1 Types of Threats
- 11.2.1.2 Physical Security
- 11.2.1.3 Types of Vulnerabilities
- 11.2.1.4 Activity - Security Threats and Vulnerabilities
11.2.2 Network Attacks
- 11.2.2.1 Types of Malware
- 11.2.2.2 Reconnaissance Attacks
- 11.2.2.3 Access Attacks
- 11.2.2.4 Denial of Service Attacks
- 11.2.2.5 Activity - Types of Attack
- 11.2.2.6 Lab - Researching Network Security Threats
11.2.3 Network Attack Mitigation
- 11.2.3.1 Backup, Upgrade, Update, and Patch
- 11.2.3.2 Authentication, Authorization, and Accounting
- 11.2.3.3 Firewalls
- 11.2.3.4 Endpoint Security
11.2.4 Device Security
- 11.2.4.1 Device Security Overview
- 11.2.4.2 Passwords
- 11.2.4.3 Basic Security Practices
- 11.2.4.4 Enable SSH
- 11.2.4.5 Packet Tracer - Configuring Secure Passwords and SSH
- 11.2.4.6 Lab - Accessing Network Devices with SSH
- 11.2.4.7 Lab - Examining Telnet and SSH in Wireshark
- 11.2.4.8 Lab - Securing Network Devices