Network Security Essentials

Discover the core fundamentals of network security and prepare to launch best defense strategies for safeguarding your network.

(NET-SEC-ESS.AP1) / ISBN : 978-1-64459-443-8
This course includes
Interactive Lessons
Gamified TestPrep
Hands-On Labs
Get A Free Trial

About This Course

This Network Security Essentials course offers a detailed introduction to the core principles and foundational knowledge of network protection. You’ll gain relevant insights for identifying the CIA triad (Confidentiality, Integrity, Availability) and its significance in network security. You’ll be exploring various security services and cryptography techniques to safeguard your data. Prepare yourself for the industry-certification with this all-inclusive course that offers hands-on-labs to solidify your fundamentals.

Skills You’ll Get

  • Understanding common network threats and vulnerabilities
  • Identifying malware, phishing attacks, denial-of-service (DoS) attacks, etc.
  • Explore CIA triads including Confidentiality, Integrity, Availability 
  • Implementing security practices like authentication, authorization, access control, non-repudiation, and data encryption
  • Accessing security tools like firewalls, IDS, IPS, and VPN
  • Using basic cryptographic concepts for securing data.
  • Ability to secure different network layers (physical, data link, network, transport, application).

1

Preface

  • What’s New in the Sixth Edition
  • Objectives
  • Support of ACM/IEEE Computer Science Curricula 2013
  • Plan of the Text
  • Projects and other Student Exercises
  • Relationship to Cryptography and Network Security
  • Acknowledgments
2

Introduction

  • Computer Security Concepts
  • The OSI Security Architecture
  • Security Attacks
  • Security Services
  • Security Mechanisms
  • Fundamental Security Design Principles
  • Attack Surfaces and Attack Trees
  • A Model for Network Security
  • Standards
  • Review Questions, and Problems
3

Symmetric Encryption and Message Confidentiality

  • Symmetric Encryption Principles
  • Symmetric Block Encryption Algorithms
  • Random and Pseudorandom Numbers
  • Stream Ciphers and RC4
  • Cipher Block Modes of Operation
  • Review Questions, and Problems
4

Public-Key Cryptography and Message Authentication

  • Approaches to Message Authentication
  • Secure Hash Functions
  • Message Authentication Codes
  • Public-Key Cryptography Principles
  • Public-Key Cryptography Algorithms
  • Digital Signatures
  • Review Questions, and Problems
5

Key Distribution and User Authentication

  • Remote User Authentication Principles
  • Symmetric Key Distribution Using Symmetric Encryption
  • Kerberos
  • Key Distribution Using Asymmetric Encryption
  • X.509 Certificates
  • Public-Key Infrastructure
  • Federated Identity Management
  • Review Questions, and Problems
6

Network Access Control and Cloud Security

  • Network Access Control
  • Extensible Authentication Protocol
  • IEEE 802.1X Port-Based Network Access Control
  • Cloud Computing
  • Cloud Security Risks and Countermeasures
  • Data Protection in the Cloud
  • Cloud Security as a Service
  • Addressing Cloud Computing Security Concerns
  • Review Questions, and Problems
7

Transport-Level Security

  • Web Security Considerations
  • Transport Layer Security
  • HTTPS
  • Secure Shell (SSH)
  • Review Questions, and Problems
8

Wireless Network Security

  • Wireless Security
  • Mobile Device Security
  • IEEE 802.11 Wireless LAN Overview
  • IEEE 802.11i Wireless LAN Security
  • Review Questions, and Problems
9

Electronic Mail Security

  • Internet Mail Architecture
  • E-mail Formats
  • E-mail Threats and Comprehensive E-mail Security
  • S/MIME
  • Pretty Good Privacy
  • DNSSEC
  • DNS-Based Authentication of Named Entities
  • Sender Policy Framework
  • Domainkeys Identified Mail
  • Domain-Based Message Authentication, Reporting, and Conformance
  • Review Questions, and Problems
10

IP Security

  • Ip Security Overview
  • Ip Security Policy
  • Encapsulating Security Payload
  • Combining Security Associations
  • Internet Key Exchange
  • Cryptographic Suites
  • Review Questions, And Problems
11

Malicious Software

  • Types of Malicious Software (Malware)
  • Advanced Persistent Threat
  • Propagation—Infected Content—Viruses
  • Propagation—Vulnerability Exploit—Worms
  • Propagation—Social Engineering—Spam e-mail, Trojans
  • Payload—System Corruption
  • Payload—Attack Agent—Zombie, Bots
  • Payload—Information Theft—Keyloggers, Phishing, Spyware
  • Payload—Stealthing—Backdoors, Rootkits
  • Countermeasures
  • Distributed Denial of Service Attacks
  • Review Questions, and Problems
12

Intruders

  • Intruders
  • Intrusion Detection
  • Password Management
  • Review Questions, and Problems
13

Firewalls

  • The Need for Firewalls
  • Firewall Characteristics and Access Policy
  • Types of Firewalls
  • Firewall Basing
  • Firewall Location and Configurations
  • Review Questions, and Problems
14

Network Management Security

  • Basic Concepts of SNMP
  • SNMPv1 Community Facility
  • SNMPv3
  • Recommended Reading
  • References
  • Review Questions, and Problems
15

Legal and Ethical Aspects

  • Cybercrime and Computer Crime
  • Intellectual Property
  • Privacy
  • Ethical Issues
  • Recommended Reading
  • References
  • Review Questions, and Problems
16

SHA-3

  • The Origins of SHA-3
  • Evaluation Criteria for SHA-3
  • The Sponge Construction
  • The SHA-3 Iteration Function f
  • Recommended Reading and Referencess
  • Review Questions, and Problems
A

Appendix A: Some Aspects of Number Theory

  • Prime and Relatively Prime Numbers
  • Modular Arithmetic
B

Appendix B: Projects for Teaching Network Security

  • Research Projects
  • Hacking Project
  • Programming Projects
  • Laboratory Exercises
  • Practical Security Assessments
  • Firewall Projects
  • Case Studies
  • Writing Assignments
  • Reading/Report Assignments
C

Appendix C: Standards and Standard-Setting Organizations

  • The Importance of Standards
  • Internet Standards and the Internet Society
  • The National Institute of Standards and Technology
  • The International Telecommunication Union
  • The International Organization for Standardization
  • Significant Security Standards and Documents
D

Appendix D: TCP/IP and OSI

  • Protocols And Protocol Architectures
  • The TCP/IP Protocol Architecture
  • The Role Of An Internet Protocol
  • IPV4
  • IPV6
  • The OSI Protocol Architecture
E

Appendix E: Pseudorandom Number Generation

  • Prng Requirements
  • Pseudorandom Number Generation Using a Block Cipher
  • Pseudorandom Number Generation Using Hash Functions and MACs
F

Appendix F: Kerberos Encryption Techniques

  • Password-To-Key Transformation
  • Propagating Cipher Block Chaining Mode
G

Appendix G: Data Compression Using ZIP

  • Compression Algorithm
  • Decompression Algorithm
H

Appendix H: PGP

  • Notation
  • Operational Description
  • Cryptographic Keys And Key Rings
  • Public-Key Management
  • Pgp Random Number Generation
I

Appendix I: The International Reference Alphabet

J

Appendix J: The Base Rate Fallacy

  • Conditional Probability and Independence
  • Bayes’ Theorem
  • The Base-Rate Fallacy Demonstrated
  • References
K

Appendix K: Radix-64 Conversion

28

References

1

Symmetric Encryption and Message Confidentiality

  • Configuring a Wireless AP
  • Establishing a SSH Connection
  • Observing a SHA256-Generated Hash Value
  • Examining Asymmetric Encryption
  • Observing an MD5-Generated Hash Value
  • Generating a Symmetric Key
  • Performing Symmetric Encryption
2

Key Distribution and User Authentication

  • Examining Kerberos Settings
  • Examining PKI Certificates
3

Wireless Network Security

  • Exploiting SNMP
  • Securing a Wi-Fi Hotspot
  • Creating a Network Policy for 802.1X
  • Using a Wireless AP for MAC Address Filtering
4

Electronic Mail Security

  • Configuring DNS Information
5

IP Security

  • Configuring an IPsec Policy
6

Malicious Software

  • Creating a Remote Access Trojan (RAT)
  • Installing Antivirus Software
  • Configuring IPSec
  • Testing an Antivirus Program
  • Simulating a DoS Attack
  • Simulating a DDoS Attack
7

Intruders

  • Understanding Local Privilege Escalation
  • Setting Up a Honeypot
8

Firewalls

  • Using Windows Firewall
  • Whitelisting an IP Address in the Windows Firewall
  • Creating Outbound and Inbound Rules for a Firewall
9

Network Management Security

  • Configuring SNMPv2c
  • Configuring SNMPv3

Any questions?
Check out the FAQs

Still have unanswered questions and need to get in touch?

Contact Us Now

This course is based on the core fundamentals of secure networks. It equips you with the knowledge required for identifying potential cyber threats and implementing hi-tech security measures to safeguard your network.

This course upgrades your existing IT skills, teaches you the core concepts of network security, and also prepares you for high-paying jobs in the field of network security.

Considering the ever-evolving landscape of cyber threats worldwide, there’s a very high demand for trained workforce in this realm. In the current job scenario, it is recognised as one of the most promising career opportunities with significant growth potential.

With uCertify, you'll have access to various support options throughout the course, such as 24/7 support team, hands-on network security labs, gamified testpreps, video tutorials, and more.

You can access assignments/testpreps/practice exams along with uCertify course materials.

Don’t Just Learn. Master It.

  Champion the concepts network security with our hands-on labs and work your way towards a high-paying job.

$ 216.72

Buy Now
scroll to top