Data Communications and Networking

  1. Network Security
    1. Security Fundamentals
      1. Security Goals
        1. Confidentiality
          1. Integrity
            1. Availability
              1. Authentication
                1. Non-repudiation
                2. Security Threats
                  1. Passive Attacks
                    1. Active Attacks
                      1. Insider Threats
                        1. External Threats
                        2. Security Services
                          1. Security Mechanisms
                          2. Cryptography
                            1. Cryptographic Concepts
                              1. Plaintext and Ciphertext
                                1. Encryption and Decryption
                                  1. Keys and Key Management
                                  2. Symmetric Cryptography
                                    1. Stream Ciphers
                                      1. Block Ciphers
                                        1. Data Encryption Standard (DES)
                                          1. Advanced Encryption Standard (AES)
                                            1. Key Distribution
                                            2. Asymmetric Cryptography
                                              1. Public Key Concepts
                                                1. RSA Algorithm
                                                  1. Elliptic Curve Cryptography (ECC)
                                                    1. Key Exchange Protocols
                                                    2. Hash Functions
                                                      1. Hash Function Properties
                                                        1. Message Digest Algorithms
                                                          1. Secure Hash Algorithm (SHA)
                                                          2. Digital Signatures
                                                            1. Digital Signature Process
                                                              1. Signature Verification
                                                                1. Digital Certificates
                                                              2. Network Security Protocols
                                                                1. IPsec (IP Security)
                                                                  1. IPsec Architecture
                                                                    1. Authentication Header (AH)
                                                                      1. Encapsulating Security Payload (ESP)
                                                                        1. Security Associations
                                                                          1. Key Management
                                                                          2. Secure Sockets Layer (SSL) and Transport Layer Security (TLS)
                                                                            1. SSL/TLS Architecture
                                                                              1. Handshake Protocol
                                                                                1. Record Protocol
                                                                                  1. Certificate Management
                                                                                  2. Secure Shell (SSH)
                                                                                    1. SSH Architecture
                                                                                      1. SSH Authentication
                                                                                        1. SSH Tunneling
                                                                                      2. Network Security Devices
                                                                                        1. Firewalls
                                                                                          1. Firewall Types
                                                                                            1. Packet Filtering Firewalls
                                                                                              1. Stateful Inspection Firewalls
                                                                                                1. Application Layer Firewalls
                                                                                                  1. Next-Generation Firewalls
                                                                                                  2. Firewall Rules
                                                                                                    1. Demilitarized Zone (DMZ)
                                                                                                    2. Intrusion Detection Systems (IDS)
                                                                                                      1. IDS Types
                                                                                                        1. Network-Based IDS
                                                                                                          1. Host-Based IDS
                                                                                                          2. Detection Methods
                                                                                                            1. Signature-Based Detection
                                                                                                              1. Anomaly-Based Detection
                                                                                                            2. Intrusion Prevention Systems (IPS)
                                                                                                              1. IPS Functionality
                                                                                                                1. IPS Deployment
                                                                                                                2. Virtual Private Networks (VPNs)
                                                                                                                  1. VPN Types
                                                                                                                    1. Site-to-Site VPN
                                                                                                                      1. Remote Access VPN
                                                                                                                      2. VPN Protocols
                                                                                                                        1. VPN Implementation
                                                                                                                      3. Wireless Security
                                                                                                                        1. Wireless Security Challenges
                                                                                                                          1. Wireless Encryption Protocols
                                                                                                                            1. Wireless Authentication Methods
                                                                                                                              1. Wireless Security Best Practices