In this section, we will continue discussing networks, with a focus on how to secure network infrastructure, and ensure that our networks provide secure and reliable access to information.
We will review various network attack methods, and discuss the tools and techniques to detect and prevent these threats such as firewalls, proxy servers, and intrusion detection systems.
The (ISC)2 Common Body of Knowledge (CBK) defines the key areas of knowledge for telecommunications and network security in this way:
Telecommunications and Network Security domain encompasses the structures, techniques, transport protocols, and security measures used to provide integrity, availability, confidentiality and authentication for transmissions over private and public communications networks.
The candidate is expected to demonstrate an understanding of communications and network security as it relates to data communications in local area and wide area networks, remote access, internet/intranet/extranet configurations. Candidates should be knowledgeable with network equipment such as switches, bridges and routers, as well as networking protocols (e.g., TCP/IP, IPsec), and VPNs.
Key areas of knowledge:
- Establish secure network architecture and design (e.g., IP and non-IP protocols, segmentation)
- Securing network components
- Establish secure communication channels (e.g., VPN, TLS/SSL, VLAN)
- Understand network attacks (e.g., DDoS, spoofing)
This week’s topics:
- Wired and Wireless Network Technologies
- Network Authentication, Access Control
- Virtual Private Networks
- Intrusion Detection Systems
In this unit, plan to:
- Read: pages 459-568 in the Network Security text
- Read: pages 405-412 in the Security Essentials text
- Complete: this week’s written assignment
- Complete: this week’s practical assignments
- Participate: in the weekly discussion forum