Network+ Certification
-
Tài liệu "Thiết lập nhận thực Wife trong Windows Server 2008" trình bày về quản trị mạng, các lưu ý và yêu cầu trước khi thực thi, cài đặt Certificate Service Role, cài đặt Network Policy and Access Server Role, cấu hình các thiết lập mạng trên máy khách.
23p merlinvu93 05-10-2014 72 12 Download
-
Chapter 3 - Attacks and malicious code (part 2). After studying this chapter you will be able to: Discuss man-in-the-middle attacks, replay attacks, and TCP session hijacking; detail three types of social-engineering attacks and explain why they can be incredibly damaging; list major types of attacks used against encrypted data; list major types of malicious software and identify a countermeasure for each one.
43p nhanmotchut_3 20-10-2016 65 6 Download
-
Chapter 12 - Policies and disaster recovery. The main contents of this chapter include all of the following: Policies and procedures, privilege management, education and documentation, communication, disaster recovery, business continuity.
45p nhanmotchut_3 20-10-2016 41 6 Download
-
Chapter 4 - Remote access. Objectives in this chapter: Understand implications of IEEE 802.1x and how it is used, understand VPN technology and its uses for securing remote access to networks, understand how RADIUS authentication works, understand how TACACS+ operates, understand how PPTP works and when it is used,...
54p nhanmotchut_3 20-10-2016 79 5 Download
-
Chapter 7 - Quản trị bảo mật cho hệ thống (Security management system). After studying this chapter you will be able to: Understand the purpose of a network firewall and the kinds of firewall technology available on the market; understand the role of routers, switches, and other networking hardware in security; determine when VPN or RAS technology works to provide a secure network connection.
76p nhanmotchut_3 20-10-2016 69 5 Download
-
Lecture Security+ Certification: Chapter 9 - System hardening. The main contents of this chapter include all of the following: Disable nonessential systems, harden operating systems, harden applications, harden networks.
39p nhanmotchut_3 20-10-2016 73 5 Download
-
Chapter 11 - Incident response. The main contents of this chapter include all of the following: Incident response overview, computer forensics defined, contemporary issues in computer forensics, forensic process, forensic tools, forensic problems, the future of computer forensics.
90p nhanmotchut_3 20-10-2016 44 5 Download
-
Chapter 2 - Authentication. After studying this chapter you will be able to: Understand AAA (3A),create strong passwords and store them securely, understand the Kerberos authentication process, understand how CHAP works, understand what mutual authentication is and why it is necessary, understand how digital certificates are created and why they are used,...
55p nhanmotchut_3 20-10-2016 64 4 Download
-
Chapter 3 - Attacks and malicious code (part 1). After reading the material in this chapter, you should be able to: Explain denial-of-service (DoS) attacks, explain and discuss ping-of-death attacks, identify major components used in a DDoS attack and how they are installed, understand major types of spoofing attacks.
43p nhanmotchut_3 20-10-2016 63 4 Download
-
Chapter 6 - Email and web security. The main contents of this chapter include all of the following: Protect e-mail systems, list World Wide Web vulnerabilities, secure web communications, secure instant messaging.
48p nhanmotchut_3 20-10-2016 56 4 Download
-
Chapter 8 - Network security topologies. Objectives in this chapter: Explain network perimeter’s importance to an organization’s security policies, identify place and role of the demilitarized zone in the network, explain how network address translation is used to help secure networks, spell out the role of tunneling in network security, describe security features of virtual local area networks.
40p nhanmotchut_3 20-10-2016 67 4 Download
-
Chapter 10 - Public key infrastructure. After completing this chapter, students will be able to: Explain cryptography strengths and vulnerabilities, define public key infrastructure (PKI), manage digital certificates, explore key management.
34p nhanmotchut_3 20-10-2016 38 4 Download
-
Chapter 1 - Overview. After studying this chapter you will be able to: Understand network security, understand security threat trends, understand the goals of network security, determine the factors involved in a secure network strategy, security certification.
18p nhanmotchut_3 20-10-2016 76 5 Download
-
Chapter 5 - Wireless security. After studying this chapter you will be able to understand: Wireless concepts, Securing digital cellular telephony, wireless application protocol, wireless transport layer security, hardening wireless local area networks, IEEE 802.11, wired equivalent privacy (WEP).
20p nhanmotchut_3 20-10-2016 68 4 Download
-
Chapter summary: DHCP assigns IP addresses by using automatic, manual, or dynamic allocation; DNS resolves host and domain names into IP addresses; WINS resolves NetBIOS names into IP addresses; ping tests whether one computer running TCP/IP can communicate with another computer on the network;...and other contents.
10p tangtuy08 21-04-2016 46 3 Download
-
Chapter summary: Bridges selectively relay packets between network segments, depending on their data-link layer destination addresses; bridges maintain a single broadcast domain and create separate collision domains; switches improve on the function of bridges by forwarding packets only to their destination systems;...and other contents.
16p tangtuy08 21-04-2016 42 3 Download
-
In this chapter, students will be able to understand: Password policies ensure that users choose effective passwords; user-level security requires a separate account for each user; in share-level security, all users access shares by using the same passwords; a firewall is a hardware or software product that protects a network from unauthorized access, using techniques such as packet filtering, NAT, or proxy servers;...
15p tangtuy08 21-04-2016 37 3 Download
-
In this chapter, students will be able to understand: Routers receive packets and use the most efficient path to forward them to their destinations, complex internetworks can have redundant routers that provide multiple paths to the same destination, routers store information about the network in a routing table,...
4p tangtuy08 21-04-2016 48 2 Download
-
This chapter includes contents: Types of remote network connections, public switched telephone network (PSTN), modems, modem communications, configuring a modem, Virtual Private Network (VPN) communications,...
13p tangtuy08 21-04-2016 40 2 Download
-
Chapter summary: Computers have a variety of ports, some of which are implemented by the motherboard and others by expansion cards; computers use many different types of connectors fortheir various interfaces, and in some cases the same connector type can provide different functions; SCSI host adapters can use any one of several types of connectors, which are not interchangeable;...
16p tangtuy08 21-04-2016 37 4 Download