intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Network+ Certification

Xem 1-20 trên 33 kết quả Network+ Certification
  • Tài liệu "Thiết lập nhận thực Wife trong Windows Server 2008" trình bày về quản trị mạng, các lưu ý và yêu cầu trước khi thực thi, cài đặt Certificate Service Role, cài đặt Network Policy and Access Server Role, cấu hình các thiết lập mạng trên máy khách.

    pdf23p merlinvu93 05-10-2014 72 12   Download

  • Chapter 3 - Attacks and malicious code (part 2). After studying this chapter you will be able to: Discuss man-in-the-middle attacks, replay attacks, and TCP session hijacking; detail three types of social-engineering attacks and explain why they can be incredibly damaging; list major types of attacks used against encrypted data; list major types of malicious software and identify a countermeasure for each one.

    pdf43p nhanmotchut_3 20-10-2016 65 6   Download

  • Chapter 12 - Policies and disaster recovery. The main contents of this chapter include all of the following: Policies and procedures, privilege management, education and documentation, communication, disaster recovery, business continuity.

    pdf45p nhanmotchut_3 20-10-2016 41 6   Download

  • Chapter 4 - Remote access. Objectives in this chapter: Understand implications of IEEE 802.1x and how it is used, understand VPN technology and its uses for securing remote access to networks, understand how RADIUS authentication works, understand how TACACS+ operates, understand how PPTP works and when it is used,...

    pdf54p nhanmotchut_3 20-10-2016 79 5   Download

  • Chapter 7 - Quản trị bảo mật cho hệ thống (Security management system). After studying this chapter you will be able to: Understand the purpose of a network firewall and the kinds of firewall technology available on the market; understand the role of routers, switches, and other networking hardware in security; determine when VPN or RAS technology works to provide a secure network connection.

    pdf76p nhanmotchut_3 20-10-2016 69 5   Download

  • Lecture Security+ Certification: Chapter 9 - System hardening. The main contents of this chapter include all of the following: Disable nonessential systems, harden operating systems, harden applications, harden networks.

    pdf39p nhanmotchut_3 20-10-2016 73 5   Download

  • Chapter 11 - Incident response. The main contents of this chapter include all of the following: Incident response overview, computer forensics defined, contemporary issues in computer forensics, forensic process, forensic tools, forensic problems, the future of computer forensics.

    pdf90p nhanmotchut_3 20-10-2016 44 5   Download

  • Chapter 2 - Authentication. After studying this chapter you will be able to: Understand AAA (3A),create strong passwords and store them securely, understand the Kerberos authentication process, understand how CHAP works, understand what mutual authentication is and why it is necessary, understand how digital certificates are created and why they are used,...

    pdf55p nhanmotchut_3 20-10-2016 64 4   Download

  • Chapter 3 - Attacks and malicious code (part 1). After reading the material in this chapter, you should be able to: Explain denial-of-service (DoS) attacks, explain and discuss ping-of-death attacks, identify major components used in a DDoS attack and how they are installed, understand major types of spoofing attacks.

    pdf43p nhanmotchut_3 20-10-2016 63 4   Download

  • Chapter 6 - Email and web security. The main contents of this chapter include all of the following: Protect e-mail systems, list World Wide Web vulnerabilities, secure web communications, secure instant messaging.

    pdf48p nhanmotchut_3 20-10-2016 56 4   Download

  • Chapter 8 - Network security topologies. Objectives in this chapter: Explain network perimeter’s importance to an organization’s security policies, identify place and role of the demilitarized zone in the network, explain how network address translation is used to help secure networks, spell out the role of tunneling in network security, describe security features of virtual local area networks.

    pdf40p nhanmotchut_3 20-10-2016 67 4   Download

  • Chapter 10 - Public key infrastructure. After completing this chapter, students will be able to: Explain cryptography strengths and vulnerabilities, define public key infrastructure (PKI), manage digital certificates, explore key management.

    pdf34p nhanmotchut_3 20-10-2016 38 4   Download

  • Chapter 1 - Overview. After studying this chapter you will be able to: Understand network security, understand security threat trends, understand the goals of network security, determine the factors involved in a secure network strategy, security certification.

    pdf18p nhanmotchut_3 20-10-2016 76 5   Download

  • Chapter 5 - Wireless security. After studying this chapter you will be able to understand: Wireless concepts, Securing digital cellular telephony, wireless application protocol, wireless transport layer security, hardening wireless local area networks, IEEE 802.11, wired equivalent privacy (WEP).

    pdf20p nhanmotchut_3 20-10-2016 68 4   Download

  • Chapter summary: DHCP assigns IP addresses by using automatic, manual, or dynamic allocation; DNS resolves host and domain names into IP addresses; WINS resolves NetBIOS names into IP addresses; ping tests whether one computer running TCP/IP can communicate with another computer on the network;...and other contents.

    pdf10p tangtuy08 21-04-2016 46 3   Download

  • Chapter summary: Bridges selectively relay packets between network segments, depending on their data-link layer destination addresses; bridges maintain a single broadcast domain and create separate collision domains; switches improve on the function of bridges by forwarding packets only to their destination systems;...and other contents.

    pdf16p tangtuy08 21-04-2016 42 3   Download

  • In this chapter, students will be able to understand: Password policies ensure that users choose effective passwords; user-level security requires a separate account for each user; in share-level security, all users access shares by using the same passwords; a firewall is a hardware or software product that protects a network from unauthorized access, using techniques such as packet filtering, NAT, or proxy servers;...

    pdf15p tangtuy08 21-04-2016 37 3   Download

  • In this chapter, students will be able to understand: Routers receive packets and use the most efficient path to forward them to their destinations, complex internetworks can have redundant routers that provide multiple paths to the same destination, routers store information about the network in a routing table,...

    pdf4p tangtuy08 21-04-2016 48 2   Download

  • This chapter includes contents: Types of remote network connections, public switched telephone network (PSTN), modems, modem communications, configuring a modem, Virtual Private Network (VPN) communications,...

    pdf13p tangtuy08 21-04-2016 40 2   Download

  • Chapter summary: Computers have a variety of ports, some of which are implemented by the motherboard and others by expansion cards; computers use many different types of connectors fortheir various interfaces, and in some cases the same connector type can provide different functions; SCSI host adapters can use any one of several types of connectors, which are not interchangeable;...

    pdf16p tangtuy08 21-04-2016 37 4   Download

CHỦ ĐỀ BẠN MUỐN TÌM

ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2