Skill Set Name: Network Security

Topics Level Sub topics Skill Category No Code Share comment
Outline of network security I

Knowing The basics of network security.


  • Introduction to network security
  • Background and Problem
  • Network security model
  • Attack process
  • Attack technology
  • Malicious code
  • Development
     
7-2-1-I
Virus characteristics and antivirus measures I

Understanding virus characteristics and antivirus


  • Virus overview
  • Virus characteristics
  • The kinds of viruses
    • Boot virus
    • File virus
    • Micro virus
    • Mutation virus
    • U disk virus
  • Network virus
    • Trojan
    • Worm
    • Mobile virus
       
7-2-2-I
Virus characteristics and antivirus measures II

Understanding antivirus


  • Anti-virus measures
    • Characteristics scan
    • Behavior audit
    • Active kernel defense
    • System patch
    • Other antivirus measures
       
7-2-2-II
Simplified classification of network attack methods I

Understanding network attack methods


  • Attack methods overview
  • Attack Technology
    • Scan technology
    • Password attack
    • DDOS
    • Buffer overflow
    • Google hacking
    • Network fishing
    • SQL injection
    • Convert TCP Attack
    • etc
       
7-2-3-I
Unauthorized access techniques by exploiting TCP I

Knowing the techniques of exploiting TCP


  • Introduction to TCP
  • TCP protocol
  • Vulnerability of TCP
  • Exploiting for TCP
     
7-2-4-I
Attacks on the Web I

Knowing the techniques of Attacking on the Web


  • Introduction to Web
  • Security mechanism of Web
    • IIS
    • Apache
    • Tomcat
  • Vulnerability of Web
  • Exploiting for Web
  • Exploitation Code
     
7-2-5-I
Unauthorized access techniques by exploiting IP II

Knowing the techniques of exploiting IP


  • Introduction to IP
  • IP protocol
  • Vulnerability of IP
  • Exploiting for IP
     
7-2-6-II
TCP/IP network security design methods II

Knowing TCP/IP network security design methods


  • Introduction to TCP/IP network security
  • Risk evaluation
  • Security engineering
  • Survivability methods
  • Security architecture design
     
7-2-7-II
Mechanism of access control, and firewall functions II

Knowing the mechanism of firewall


  • Introduction to access control
    • DAC/MAC
  • Firewall overview
  • Functions
    • Router
    • Payload distribution
    • VLAN
    • NAT
    • Filter
    • Monitor
    • QOS
    • VPN
7-2-8-II
Network vulnerability investigation II

Knowing network vulnerability investigation


  • Network vulnerability overview
  • TCP/IP protocol security
  • Security of network device
    • Router vulnerability
    • Switch vulnerability
    • IDS
    • Firewall
  • Fuzz Testing
     
7-2-9-II
Intrusion detection system specifications and installation II

Knowing network vulnerability investigation


  • Introduction to IDS
  • System Specifications
  • IDS Installation
    • RealSecure
    • Snort
    • Session Wall
       

 

7-2-10-II
Mobile computing and remote access security II

Knowing network vulnerability investigation


  • Mobile computing
  • Remote access
  • Ad hoc network
  • Security
  • Mobile Agent
  • Authority
     
7-2-11-II
Linux network security measures II

Knowing network vulnerability investigation


  • Network vulnerability overview
  • TCP/IP protocol security
  • Security of network device
    • Router vulnerability
    • Switch vulnerability
    • IDS
    • Firewall
  • Fuzz Testing
7-2-12-II
Network security creation II

Knowing network security creation


  • Principle
  • Method
  • Architecture
  • Secure Model
  • Practice example
     
7-2-13-II
Secure network creation II

Knowing secure network creation


  • Principle
  • Information collection
  • Scanning
  • Assessment
  • Suggest of secure network
     
7-2-14-II
Mechanism of intrusion detection systems II

Knowing network vulnerability investigation


  • Principle
  • Attack Model
  • Function
  • Detection policy
  • Countermeasures of IDS
     
7-2-15-II