Module : Vulnerabilities, Threats, and Attacks
Module Overview
Introduction to Network Security
The need for network security
Identifying potential risks to network security
Open versus closed security models
Trends driving network security
Information security organizations
Introduction to Vulnerabilities, Threats, and Attacks
Vulnerabilities
Threats
Attacks
Attack Examples
Reconnaissance attacks
Access attacks
Denial of service attacks
Distributed denial of service attacks
Malicious code
Vulnerability Analysis
Policy review
Network analysis
Host analysis
Analysis tools
Module: Summary
Module: Quiz



Close Window
All contents copyright ©2001-2005 Cisco Systems, Inc. All rights reserved.