|
Dec 26, 2024
|
|
|
|
NET 432 - Linux System Security Credits: 3 Lecture Hours: 2 Lab Hours: 2 Practicum Hours: 0 Work Experience: 0 Course Type: Voc/Tech This is the first in a series of ITNA Security courses. This course details how to protect your network from malicious users and how to choose and configure a Firewall for Microsoft Windows, Novell, Linux and Cisco. For further information, contact the program chairperson of the ITNA Department. Competencies
- Characterize the need for security policies
- Define the scope of the problem
- Determine Objectives, Constraints, Risks and Cost
- Analyze the Authentication process
- Describe session hijacking
- Describe how to verify the source and destination.
- Describe DNS poisoning
- Describe the use of Digital Signatures
- Analyze the need for Encryption
- List the protocols that use clear text
- Illustrate clear text packets that may be captured by malicious users
- Describe the methods of Encryption
- Describe Encryption weaknesses
- Describe Public-Key Encryption
- Describe and compare the major operating systems secure features
- Analyze Windows 2000 Local Security
- Describe the need for a Firewall
- List and explain the different firewall elements.
- Compare the strengths and weaknesses of different firewalls
- For Window
- For Linux
- For Novel
- For Cisco
Add to Portfolio (opens a new window)
|
|