It teaches protocol layers and security, the resources needed to secure servers, using firewalls, the levels of firewall protection, how to detect and distract hackers, and how to respond to hacker activity.
· Identify the components of a TCP/IP packet and security risks related to TCP/IP at various layers of the OSI model.
· Identify the implementation of TCP/IP security on a Windows NT system.
· Identify securing the Web server, FTP server, and SMTP server and testing the network security for a specific network.
· Identify firewalls and proxy servers.
· Identify setting up RAS for VPN and establishing a VPN session.
· Identify firewall design.
· Identify how to configure WinRoute.
· Identify proactive detection, the prevention of breach of network security, and the creation of response plans to handle breach of network security.
None
The target audiences for this course are, System Administrators, Application Developers, Firewall Administrators, and IT Security Officers