User Tools

Site Tools


classlog:computer_network_security

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
Last revisionBoth sides next revision
classlog:computer_network_security [2014/05/07 18:31] – [Homework] neilhaoclasslog:computer_network_security [2014/05/07 20:47] – [PowerPoints] neilhao
Line 44: Line 44:
     * {{:classlog:computernetworksecurity:04-name_service_1_.pdf|Name_Service}}      * {{:classlog:computernetworksecurity:04-name_service_1_.pdf|Name_Service}} 
     * {{:classlog:computernetworksecurity:06-network_protocol_analysis.pdf|Network Protocol Analysis}}      * {{:classlog:computernetworksecurity:06-network_protocol_analysis.pdf|Network Protocol Analysis}} 
 +    * {{:classlog:computernetworksecurity:07-firewall.pdf|Firewall}} 
 +    * {{:classlog:computernetworksecurity:08-iptables.pdf|iptables}} 
 +    * {{:classlog:computernetworksecurity:internet_rrouting_protocols.pdf|Internetworking (Bridging, Routing, fragmentation, segmentation)}} 
 +    * {{:classlog:computernetworksecurity:cryptography_overview.pdf|Introduction of Applied Cryptography}} 
 +    * {{:classlog:computernetworksecurity:10-des-aes.pdf|DES and AES}}  ({{:classlog:computernetworksecurity:10-des-aes-short.pdf|Short Version}}  )
 +    * {{:classlog:computernetworksecurity:10-hash-dh-rsa-short.pdf|Hash, DH and RSA}} 
 +    * {{:classlog:computernetworksecurity:11-web_security-ssl-tls.pdf|Web Security SSL/TLS, Certificates, PKI and PGP}} 
 +    * {{:classlog:computernetworksecurity:how_to_counter_man-in-the-middle_sslstrip_attack.pdf|Web Authentication }} 
 +    * {{:classlog:computernetworksecurity:13-snort.pdf|Network Intrusion Detection System A case study through snort}} 
 +    * {{:classlog:computernetworksecurity:logging_service.pdf|Logging Service}} 
 +    * {{:classlog:computernetworksecurity:12-network_attacks-layer2-layer3.pdf|Network Attacks (Layer 2 and Layer 3)}} 
 +    * {{:classlog:computernetworksecurity:12-authentication.pdf|Authentication Service}} 
 +    * {{:classlog:computernetworksecurity:12-network_attackslayer4-and-above.pdf|Network Attacks (Level 4 and Above)}} 
 +    * {{:classlog:computernetworksecurity:15-dns_security.pdf|DNS Security}} 
 +    * {{:classlog:computernetworksecurity:penetration_test.pdf|Computer Network Penetration Testing}} 
 +    * {{:classlog:computernetworksecurity:16-metasploit.pdf|Nmap & Metasploit}}  ([[http://www.openvas.org/|OpenVAS]])
 +    * {{:classlog:computernetworksecurity:wireless_network_security.pdf|Wireless Network Security Overview}} 
 +    * {{:classlog:computernetworksecurity:wireless_hacking.pdf|Wireless Hacking}} 
 +    * {{:classlog:computernetworksecurity:wireless_attaks.pdf|Wireless Network Attacks}} 
 +    * {{:classlog:computernetworksecurity:20-network_security_now_and_future.pdf|Network Security: Now and the Future - be prepared for unknown}} 
  
 +
 +----
  
 ===== Homework ===== ===== Homework =====
classlog/computer_network_security.txt · Last modified: 2023/02/11 17:30 by 127.0.0.1

Except where otherwise noted, content on this wiki is licensed under the following license: CC Attribution-Noncommercial-Share Alike 4.0 International
CC Attribution-Noncommercial-Share Alike 4.0 International Donate Powered by PHP Valid HTML5 Valid CSS Driven by DokuWiki