The Internet continues to grow exponentially. As personal,
government and business-critical applications become more prevalent on the
Internet, there are many immediate benefits. However, these network-based
applications and services can pose security risks to individuals as well as to
the information resources of companies and government. In many cases, the rush
to get connected comes at the expense of adequate network security. Information
is an asset that must be protected. Without adequate protection or network
security, many individuals, businesses, and governments are at risk of losing
that asset.
Network security is the process by which digital information
assets are protected. The goals of security are to protect confidentiality,
maintain integrity, and assure availability. With this in mind, it is
imperative that all networks be protected from threats and vulnerabilities in
order for a business to achieve its fullest potential. Typically, these threats
are persistent due to vulnerabilities, which can arise from misconfigured
hardware or software, poor network design, inherent technology weaknesses, or
end-user carelessness.
This module provides an overview of essential
network security concepts, common vulnerabilities, threats, attacks, and
vulnerability analysis.
PIX Security Appliance Command Reference
Cisco IOS Security Command Reference
 |
NOTE:
It is required that the student study the commands covered in the
chapter using the labs and the Command Reference. Not all required commands are
covered in sufficient detail in the text alone. Successful completion of this
course requires a thorough knowledge of command syntax and application.
|