Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Buy Now $5.00
Standard view
Full view
of .
Save to My Library
Look up keyword or section
Like this
2Activity

Table Of Contents

What is Security?
Asset Identification
Risk Assessment
Security Measures
Three Aspects of Security
Who Needs Security?
What are Security Policies?
Typical Policy List
Security Threats
Nondigital Physical Security Threats
Digital Physical Security Threats
Machine Physical Threats
File or Device Physical Threats
Local Access Physical Threat Example: BackTrack
BackTrack: Password Attack Utility Menu
BackTrack: DNS Info Utilities
Programmed Machine Physical Threats
Virus Types
Worm Example: MyDoom.M
How a Network Works: Data Ordering
How a Network Works: Hardware
How a Network Works: Domain Organization
How a Network Works: Data Transmission (3 of 3)
How a Network Works: Network Protocol Models
How a Network Works: TCP/IP Encapsulation
How a Network Works: TCP/IP Link Protocols
How a Network Works: TCP/IP Internet Protocols (1 of 2)
How a Network Works: TCP/IP Internet Protocols (2 of 2)
How a Network Works: TCP/IP Transport Protocols (1 of 2)
How a Network Works: TCP/IP Transport Protocols (2 of 2)
How a Network Works: TCP/IP Application Protocols
How a Network Works: nonTCP/IP Protocols (1 of 2)
How a Network Works: nonTCP/IP Protocols (2 of 2)
Lunch
Operational Security Threats
Causes of Operational Threats
Social Engineering Threat
Account Carelessness
LAN Carelessness
Internet Carelessness
Removable-Medium Carelessness
Summary of Physical and Operational Threats
Threats from Runnable Application Types
Generic Application Threats
Specific Network Threats: Cross-Site Scripting (XSS)
Specific Network Threats: DNS Spoofing (1 of 2)
Specific Network Threats: DNS Spoofing (2 of 2)
Threats from Specific Applications: Flash (ActionScript)
Threats from Specific Applications: Java
Threats from Specific Applications: JavaScript
Threats from Specific Applications: Acrobat PDF
Threats from Other Media Applications
Three Goals of Security
End of Workshop
0 of .
Results for:
No results containing your search query
P. 1
Network Security 1Day Course Slides

Network Security 1Day Course Slides

Ratings: (0)|Views: 1,143|Likes:
These slides are intended for a 1-day course in network security for managers or maintainers of Windows, Linux, and other systems.

The presentation concentrates on TCP/IP systems and is compatible with the Dulaney CompTIA Security+ SY0-201 exam study guide. It covers the basics of asset identification, risk assessment, and the related security measures of prevention, detection, and response. Various physical and operational threats are discussed in the context of typical network maintenance and operation.
These slides are intended for a 1-day course in network security for managers or maintainers of Windows, Linux, and other systems.

The presentation concentrates on TCP/IP systems and is compatible with the Dulaney CompTIA Security+ SY0-201 exam study guide. It covers the basics of asset identification, risk assessment, and the related security measures of prevention, detection, and response. Various physical and operational threats are discussed in the context of typical network maintenance and operation.

More info:

Categories:Types, Research
Published by: John Michael Williams on Feb 23, 2013
Copyright:Traditional Copyright: All rights reserved
List Price: $5.00 Buy Now

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
See more
See less

05/18/2014

$5.00

USD

pdf

text

original

You're Reading a Free Preview
Pages 9 to 70 are not shown in this preview.

Activity (2)

You've already reviewed this. Edit your review.
1 thousand reads
1 hundred reads

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->