Learn about the techniques, design concepts, and devices used protect the confidentiality and availability of network traffic as you prepare for the Security+ exam.
Overview
Syllabus
Introduction
- Network security
- What you need to know
- Study resources
- Introducing TCP/IP
- IP addresses and DHCP
- Domain name system (DNS)
- Network ports
- ICMP
- Security zones
- VLANs and network segmentation
- Security device placement
- Software-defined networking (SDN)
- Routers, switches, and bridges
- Firewalls
- Proxy servers
- Load balancers
- VPNs and VPN concentrators
- Network intrusion detection and prevention
- Protocol analyzers
- Unified threat management
- Restricting network access
- Network access control
- Firewall rule management
- Router configuration security
- Switch configuration security
- Maintaining network availability
- Network monitoring
- SNMP
- Isolating sensitive systems
- Deception technologies
- TLS and SSL
- IPsec
- Securing common protocols
- Understanding wireless networking
- Wireless encryption
- Wireless authentication
- Wireless signal propagation
- Wireless networking equipment
- Denial of service attacks
- Eavesdropping attacks
- DNS attacks
- Layer 2 attacks
- Network address spoofing
- Wireless attacks
- Propagation attacks
- Preventing rogues and evil twins
- Disassociation attacks
- Understanding Bluetooth and NFC attacks
- RFID security
- Mobile connection methods
- Mobile device security
- Mobile device management
- Mobile device tracking
- Mobile application security
- Mobile security enforcement
- Bring your own device (BYOD)
- Mobile deployment models
- Ping and traceroute
- DNS tools
- Ipconfig, ifconfig, and route
- netstat
- netcat
- ARP
- curl
- theHarvester
- Cuckoo
- Port scanners
- Vulnerability scanners
- Continuing your studies
Taught by
Mike Chapple