intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Information security lecturers

Xem 1-20 trên 24 kết quả Information security lecturers
  • Chapter 3 - Attacks and malicious code (part 2). After studying this chapter you will be able to: Discuss man-in-the-middle attacks, replay attacks, and TCP session hijacking; detail three types of social-engineering attacks and explain why they can be incredibly damaging; list major types of attacks used against encrypted data; list major types of malicious software and identify a countermeasure for each one.

    pdf43p nhanmotchut_3 20-10-2016 65 6   Download

  • Chapter 12 - Policies and disaster recovery. The main contents of this chapter include all of the following: Policies and procedures, privilege management, education and documentation, communication, disaster recovery, business continuity.

    pdf45p nhanmotchut_3 20-10-2016 41 6   Download

  • Chapter 4 - Remote access. Objectives in this chapter: Understand implications of IEEE 802.1x and how it is used, understand VPN technology and its uses for securing remote access to networks, understand how RADIUS authentication works, understand how TACACS+ operates, understand how PPTP works and when it is used,...

    pdf54p nhanmotchut_3 20-10-2016 79 5   Download

  • Chapter 7 - Quản trị bảo mật cho hệ thống (Security management system). After studying this chapter you will be able to: Understand the purpose of a network firewall and the kinds of firewall technology available on the market; understand the role of routers, switches, and other networking hardware in security; determine when VPN or RAS technology works to provide a secure network connection.

    pdf76p nhanmotchut_3 20-10-2016 69 5   Download

  • Lecture Security+ Certification: Chapter 9 - System hardening. The main contents of this chapter include all of the following: Disable nonessential systems, harden operating systems, harden applications, harden networks.

    pdf39p nhanmotchut_3 20-10-2016 73 5   Download

  • Chapter 11 - Incident response. The main contents of this chapter include all of the following: Incident response overview, computer forensics defined, contemporary issues in computer forensics, forensic process, forensic tools, forensic problems, the future of computer forensics.

    pdf90p nhanmotchut_3 20-10-2016 44 5   Download

  • Chapter 2 - Authentication. After studying this chapter you will be able to: Understand AAA (3A),create strong passwords and store them securely, understand the Kerberos authentication process, understand how CHAP works, understand what mutual authentication is and why it is necessary, understand how digital certificates are created and why they are used,...

    pdf55p nhanmotchut_3 20-10-2016 64 4   Download

  • Chapter 3 - Attacks and malicious code (part 1). After reading the material in this chapter, you should be able to: Explain denial-of-service (DoS) attacks, explain and discuss ping-of-death attacks, identify major components used in a DDoS attack and how they are installed, understand major types of spoofing attacks.

    pdf43p nhanmotchut_3 20-10-2016 63 4   Download

  • Chapter 6 - Email and web security. The main contents of this chapter include all of the following: Protect e-mail systems, list World Wide Web vulnerabilities, secure web communications, secure instant messaging.

    pdf48p nhanmotchut_3 20-10-2016 56 4   Download

  • Chapter 8 - Network security topologies. Objectives in this chapter: Explain network perimeter’s importance to an organization’s security policies, identify place and role of the demilitarized zone in the network, explain how network address translation is used to help secure networks, spell out the role of tunneling in network security, describe security features of virtual local area networks.

    pdf40p nhanmotchut_3 20-10-2016 67 4   Download

  • Chapter 10 - Public key infrastructure. After completing this chapter, students will be able to: Explain cryptography strengths and vulnerabilities, define public key infrastructure (PKI), manage digital certificates, explore key management.

    pdf34p nhanmotchut_3 20-10-2016 38 4   Download

  • Lecture Electronic commerce - Chapter 11: E-Commerce Security learning objectives: Explain EC-related crimes and why they cannot be stopped. Describe an EC security strategy and why a life cycle approach is needed. Describe the information assurance security principles. Describe EC security issues from the perspective of customers and e-businesses.

    ppt51p caphesuadathemtac 09-11-2021 16 3   Download

  • Lecture "On safety and security of information systems: Malicious attacks" provide students with knowledge about: Malicious attack; The common types of malicious attacks; Attack tools; Malicious software;... Please refer to the detailed content of the lecture!

    pdf39p hoabingan205 12-12-2022 22 6   Download

  • Lecture "On safety and security of information systems: Introduction to information systems security" provide students with knowledge about: History of information security; Information systems security; Risks, threats, and vulnerabilities;... Please refer to the detailed content of the lecture!

    pdf59p hoabingan205 12-12-2022 15 5   Download

  • Lecture "On safety and security of information systems: Cryptography" provide students with knowledge about: Basic terminology of cryptography; History of cryptography; Symmetric cipher;... Please refer to the detailed content of the lecture!

    pdf56p hoabingan205 12-12-2022 12 5   Download

  • Lecture "On safety and security of information systems: Symmetric ciphers" provide students with knowledge about: Block cipher principles; Data encryption standard; Feistel cipher;... Please refer to the detailed content of the lecture!

    pdf41p hoabingan205 12-12-2022 13 5   Download

  • Lecture "On safety and security of information systems: Symmetric ciphers advanced encryption standard" provide students with knowledge about: AES Origins; AES Structure; AES Key Expansion; An AES Example;... Please refer to the detailed content of the lecture!

    pdf38p hoabingan205 12-12-2022 16 5   Download

  • Lecture "On safety and security of information systems: Asymmetric ciphers" provide students with knowledge about: principles of public-Key cryptosystems; RSA algorithm;... Please refer to the detailed content of the lecture!

    pdf23p hoabingan205 12-12-2022 13 5   Download

  • Lecture "On safety and security of information systems: Cryptographic hash funtionns" provide students with knowledge about: Hash function; Applications of cryptographic hash functions; Simple hash functions; Requirements and security;... Please refer to the detailed content of the lecture!

    pdf22p hoabingan205 12-12-2022 15 5   Download

  • Lecture "On safety and security of information systems: Firewall" provide students with knowledge about: Firewall concept; Commercial firewalls; Selecting a firewall system;... Please refer to the detailed content of the lecture!

    pdf26p hoabingan205 12-12-2022 22 5   Download

CHỦ ĐỀ BẠN MUỐN TÌM

ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2