 | |
| Introduction to Network Security |
|
 | |
| The need for network security |
 |
| Identifying potential risks to network security |
 |
| Open versus closed security models |
 |
| Trends driving network security |
 |
| Information security organizations |
|
 |
| Introduction to Vulnerabilities, Threats, and Attacks |
|
 | |
| Vulnerabilities |
 |
| Threats |
 |
| Attacks |
|
 |
| Attack Examples |
|
 | |
| Reconnaissance attacks |
 |
| Access attacks |
 |
| Denial of service attacks |
 |
| Distributed denial of service attacks |
 |
| Malicious code |
|
 |
| Vulnerability Analysis |
|
 | |
| Policy review |
 |
| Network analysis |
 |
| Host analysis |
 |
| Analysis tools |
|
 |