The technique of preventing and defending against unwanted infiltration into business networks is known as network security. Endpoint security, primarily focuses on specific devices, is supplemented by network security, which concentrates on how such devices communicate and the connection protocols connecting them.
Encryption is a method of securing information so only authorised parties may decipher it. It is the process of transforming human-readable unencrypted to unreadable text, also known as ciphertext, in technical language.
Intrusion Prevention System
An intrusion prevention system (IPS) is used to detect the malicious activities, log identified threats, notify discovered risks, and conduct preemptive measure to stop a threat from causing harm.
- Introduction to Cryptography , Hashing (Symmetric, Asymmetric, Md5, SHA-1)
- Introduction and Configurations to VPN, Firewalls, HoneyPots and Intrusion Detection/Prevention Systems
- Introduction of Tunneling and Protocols architectures (IPsec)
- Basic Threats and End-Point Security
- Reversing Network Packets and Analyzing Threats Manually
- Implementation of Secure Networking using GNS3
- Pros & Cons of TCP and UDP related to Security
- Implementation of Security Policies and Understanding of Standardization
- Understanding Defense-in-Depth and IP vulnerabilities
- Layer 2 and 3 Attack Mitigations
- Prevention of DNS from Poisoning