Internet Security Technology and Hacking

License / Price: Freeware
Language: English
File size: 26 MB
1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)
Loading...
11,924 views

Internet Security Technology and Hacking

Internet Security Technology and Hacking has evolved over the past few years and is one of the fastest-growing areas in the industry. Information security is on top of the agenda for all organizations. Companies need to keep information secure, and there is an ever-growing demand for the IT professionals who know how to do this.

  • Chapter 1
    “Overview of Network Security,” introduces principles of network security, security models, and a basic overview of security standards, policies, and the network security framework.
  • Chapter 2,
    “Access Control,” describes the capability to perform traffic filtering using access control lists (ACL). It covers numerous types of ACL, such as standard and extended ACL, Lock-and-key, Reflexive, Time-based, Receive ACL, Infrastructure ACL, and Transit ACL. The chapter addresses traffic filtering based on RFC standards and best common practices.
  • Chapter 3,
    “Device Security,” covers some of the most common techniques used for device hardening and securing management access for routers, firewall appliances, and the intrusion prevention system (IPS) appliance.
  • Chapter 4,
    “Security Features on Switches,” provides a comprehensive set of security features available on the switches. The chapter covers port-level security controls at Layer 2 and security features and best practices available on the switch.
  • Chapter 5,
    “Cisco IOS Firewall,” introduces the software-based IOS firewall features, including the legacy Context-Based Access Control (CBAC) and the newly introduced Zone-Based Policy Firewall (ZFW) feature available on the router.
  • Chapter 6,
    “Cisco Firewalls: Appliance and Module,” covers the complete range of hardware-based Cisco firewall products, including Cisco PIX, Cisco ASA Firewall appliance, and Cisco Firewall Services Module (FWSM). The chapter provides comprehensive coverage of firewall operating systems (OS), software features, and capabilities.
  • Chapter 7,
    “Attack Vectors and Mitigation Techniques,” is a uniquely positioned chapter covering details of common types of attacks, and providing details of how to characterize and classify various attacks. The chapter provides mitigation techniques for a wide range of attacks at Layer 2 and Layer 3.

Leave a Reply