Domain 4 - Communications and Network Security

Domain 4 - Communications and Network Security

Domain 4 Communications and Network Security

Objectives

Introduction to Secure Network Architecture and Design

Open Systems Interconnection (OSI)

Working of the OSI Model Physical Layer

Data Link Layer

Network Layer

Transport Layer

Session Layer

Presentation Layer

Application Layer

Transmission Control Protocol/ Internet Protocol (TCP/IP) Model

Network Access Layer and Internet Layer Host to Host Layer and Application Layer

Comparison of OSI and TCP/IP Models

IP Addressing - Introduction

IPv4 and IPv6

Classful IP Addressing

There are five types of classful IP Addressing : Class

Sunet Mask Decimal

IP Address Range

A

255.0.0.0

0.0.0.0

127.255.255.255

B 233.255.0.0

128.0.0.0

191.255.255.255

C

255.255.255.0

192.0.0.0

223.255.255.255

D

Reserved for Multicast groups 224.0.0.0

239.255.255.255

E

Reserved for R&D and future research

240.0.0.0

255.255.255.255

Classless Inter Domain Routing (CIDR)

Private Networks and Loopback Address

Types of IP Addressing Routed and Routing Protocols

Transmission Control Protocol (TCP)

User Datagram Protocol (UDP)

Internet Protocol

Address Resolution Protocol

Internet Control Message Protocol (ICMP)

Hyper Text Transfer Protocol (HTTP)

Implications of Multi Layer Protocols

Distributed Network Protocol Transmission Media

Twisted Pair

Coaxial Cable box

Fibre Optic Cable box

Network Topologies

Network Transmission Channel

Carrier-Sense Multiple Access with Collision Detection

Carrier-Sense Multiple Access with Collision Avoidance

List of Networking Devices VLANs

Network Access Control Devices

Packet Filtering and Application Level

Circuit Level and Stateful Inspection

Firewall Architectures

Networks and Types of Networks

WAN Technologies

WAN Switching and Devices

Network Address Translation and Frame Relay Multi-Protocol Label Switching and VoIP

Virtual Networks

Remote Access - Introduction

VPN using PPTP and L2TP

Internet Security Protocol (IPsec)

IPsec - Modes of operation

IPsec Security Protocols Authentication Header (AH)

IPsec Security Protocols Encapsulating Security Payload (ESP)

IPsec process - Components Secure Access Protocols

Secure Access Protocols (contd)

Remote Access Security Methods

Multimedia Collaboration

Wireless Technologies

IEEE Wireless Standards and Spread Spectrum Technologies

Direct Sequence Spread Spectrum and Frequency Hopping Spread Spectrum

WLAN Operational Modes

Bluetooth Bluetooth Attack

Bluetooth Attack (contd)

Network Attacks

Network Attacks (contd)

Network Attacks - Countermeasures

Summary

This concludes Communications and Network Security

The next domain is Identity and Access Management

Recently Viewed Presentations

  • The Mathematics of Soap Films - Cleveland State University

    The Mathematics of Soap Films - Cleveland State University

    Mathematics and Soap Films John Oprea Cleveland State University TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAAA Surface tension creates a "skin" on a liquid whose molecules are polar. Example: H2O is polar,...
  • Correlations of Agrochemical Residues in Drinking Water and ...

    Correlations of Agrochemical Residues in Drinking Water and ...

    Correlations of Agrochemical Residues in Drinking Water and Birth Defects in IL. Manoj K. Mohanty and Baojie Zhang. Department of Mining and Mineral Resources Engineering. Southern Illinois University at Carbondale. ISTC Research Symposium - September 9, 2009
  • The Analytical Literary Essay

    The Analytical Literary Essay

    Thesis statement. Tips for the Broad Opening Statement. Look at your thesis for inspiration. Pull one or two key words and focus on those. For example, if your thesis is about whether Odysseus is a strong leader, then focus your...
  • Timby: Fundamental Nursing Skills and Concepts

    Timby: Fundamental Nursing Skills and Concepts

    Positioning Clients (cont'd) Positioning devices Adjustable bed Mattress Bed board (rigid structure placed under a mattress) Pillows Roller sheets Adjustable Bed Positioning Clients (cont'd) Turning and moving clients Assistive devices and additional caregivers are needed when turning or moving a...
  • Taking Notes - Kentucky Department of Education

    Taking Notes - Kentucky Department of Education

    Taking Notes Created by Lori Theaker March 2006 What makes a NOTE a NOTE? First, it means taking information - words, phrases, or data - out of a piece of text or video that you'll be using for a purpose...
  • Hammett plots in the world of enzymes

    Hammett plots in the world of enzymes

    Hammett plots in the world of enzymes. Erika Aoyama and Megan Browning. Figure 1: A Hammett plot from Louis Hammett's original 1935 paper in which he described Hammett plots. Reference: Hammett, L. P. Chem. Rev. 1935, 17 (1), 125-136. O....
  • FEMALE REPRODUCTUVE SYSTEM Female reproductive organs Figure 81-1

    FEMALE REPRODUCTUVE SYSTEM Female reproductive organs Figure 81-1

    The fertilized ovum needs 3-4 days to enter the uterine cavity from fallopian tube and another 4-5 days for implantation. During this intervals uterine secretions (uterine milk) provide nutrition for the early dividingovum. Once the ovum implants, trophoblastic cells of...
  • Preparing Teams To Be Teams - McLennan Community College

    Preparing Teams To Be Teams - McLennan Community College

    A S M A R RR T Way to Put Teamwork in Your Teams. So what is this ... The team keeps a copy of this form, and I keep a copy of this form. ... Finally, our last and...