Useful Links
Computer Science
Computer Networking
Data Communications and Networking
1. Introduction to Data Communications and Networking
2. Network Models and Layered Architectures
3. Physical Layer (Layer 1)
4. Data Link Layer (Layer 2)
5. Network Layer (Layer 3)
6. Transport Layer (Layer 4)
7. Application Layer
8. Wireless and Mobile Networks
9. Network Security
10. Network Management and Troubleshooting
Network Security
Security Fundamentals
Security Goals
Confidentiality
Integrity
Availability
Authentication
Non-repudiation
Security Threats
Passive Attacks
Active Attacks
Insider Threats
External Threats
Security Services
Security Mechanisms
Cryptography
Cryptographic Concepts
Plaintext and Ciphertext
Encryption and Decryption
Keys and Key Management
Symmetric Cryptography
Stream Ciphers
Block Ciphers
Data Encryption Standard (DES)
Advanced Encryption Standard (AES)
Key Distribution
Asymmetric Cryptography
Public Key Concepts
RSA Algorithm
Elliptic Curve Cryptography (ECC)
Key Exchange Protocols
Hash Functions
Hash Function Properties
Message Digest Algorithms
Secure Hash Algorithm (SHA)
Digital Signatures
Digital Signature Process
Signature Verification
Digital Certificates
Network Security Protocols
IPsec (IP Security)
IPsec Architecture
Authentication Header (AH)
Encapsulating Security Payload (ESP)
Security Associations
Key Management
Secure Sockets Layer (SSL) and Transport Layer Security (TLS)
SSL/TLS Architecture
Handshake Protocol
Record Protocol
Certificate Management
Secure Shell (SSH)
SSH Architecture
SSH Authentication
SSH Tunneling
Network Security Devices
Firewalls
Firewall Types
Packet Filtering Firewalls
Stateful Inspection Firewalls
Application Layer Firewalls
Next-Generation Firewalls
Firewall Rules
Demilitarized Zone (DMZ)
Intrusion Detection Systems (IDS)
IDS Types
Network-Based IDS
Host-Based IDS
Detection Methods
Signature-Based Detection
Anomaly-Based Detection
Intrusion Prevention Systems (IPS)
IPS Functionality
IPS Deployment
Virtual Private Networks (VPNs)
VPN Types
Site-to-Site VPN
Remote Access VPN
VPN Protocols
VPN Implementation
Wireless Security
Wireless Security Challenges
Wireless Encryption Protocols
Wireless Authentication Methods
Wireless Security Best Practices
Previous
8. Wireless and Mobile Networks
Go to top
Next
10. Network Management and Troubleshooting