Vous êtes sur la page 1sur 4

NETWORK

SECURITY

Contents
Page No.
1.
1.2
1.3

2.

Network Security
1.1
What is Network.
Network Security
Why do we need security? ..
1.4 Network Security and Vulnerability
1.5
Network Security Auditing..
1.6
Network Access Control

2.9

Network Attacks ..
2.1
Reconnaissance attacks..
2.2
Spoofing..
2.3
Sniffing. ..
2.4
Mapping. ..
2.5
Hijacking. ..
2.6
Trojans. ..
2.7
DoS and DDoS. ..
2.8
Social engineering. ..
Viruses ..

3.
3.1
3.2
3.3
3.4
3.5
3.6

Virtual Private Network Security


Introduction of VPN
VPN Security Framework
Application & Requirements of VPN
Types of VPN
VPN Security Issues
VPN Threats

4.

Wireless Network security

5.

Basics of cryptography ..

6.

Firewalls
6.1 What is Firewall
6.2 Network Layouts with Firewalls
6.3 Firewall Technologies
6.2.1 Application Gateways
6.2.2 Packet Filtering
6.2.3 Network Access Control
6.2.4 Virtual Private Networking
6.2.5 Hybrid Systems

Secure Network Devices


7.1 Secure Modems
7.2 Crypto Capable Routers
7.3 Virtual Private Networks

8.

Access Control System


8.1 What is Access Control System
8.2
Access Control in Physical Security
8.3 Access Control in Information Security
8.4
8.5

Need of an Access Control System

8.

Router..
8.1
ROUTER
8.2
Routing...
8.3
IP Addressing.
8.4 IP Routing..
8.5
Routing Process.....
8.6
Router Access Modes.
8.6.1 User mode...
8.6.2 Privileged mode..
8.6.3 Global configuration...
8.6.4 Line configuration mode.
8.6.5 Interface configuration mode..
8.6.6 Routing configuration mode

8.7

Configuring Password..
4.7.1 Console Password.
4.7.2 Vty Password
4.7.3 Auxiliary Password..
4.7.4 Enable Password..
4.7.5 Enable Secret Password...
4.7.6 Encryption all passwords.
Managing Configuration..

8.8
9

Types Of Routing...
9.1 Static Routing
9.1.1 Steps to perform static routing
9.1.2 Advantages of static routing
9.1.3 Disadvantages of static routing
9.1.4 Alternate command to specify static route..

9.2
9.3

9.1.5
Default
Dynamic
9.3.1
9.3.2
9.3.3
9.3.4
9.3.5

Backup route or loading static route


Routing
Routing.
Types of Dynamic Routing Protocols.
Autonomous system
Open Shortest Path First..
OSPF Hierarchical Model
LSA Flooding in OSPF

Access Control List...


6.1 ACL.
6.2
Classification Access Control List
6.3
Flow chart of Inbound ACL.
6.4
IP Standard ACL (Numbered)..
6.5
IP Standard ACL (Named)..
6.6
IP Extended ACL (Numbered)

LAN Switching.
7.1
LAN Switching.
7.2
VLAN (Virtual LAN)...

Conclusion.
Bibliography..

List of Figures
1.1.
PCS CONNECTED VIA HUB.18
1.2
PCS CONNECTED VIA SWITCH..19
1.3
PCS CONNECTED VIA BRIDGE.20
1.4
DIFFERENT N/Ws CONNECTED VIA ROUTER20
1.5
Internal Network Interface Card21
1.6
PCMCIA Network Interface Card.21
1.7
UTP21
1.8
Cross & Straight Cable...22
1.9
RJ 45 Connector.22
1.10
Networking Model.23
2.1
OSI MODEL..24
2.2
Windowing.26
2.3
3 Way hand shaking...27
2.4
Connection Oriented Communication28
3.1
TCP/IP MODEL.30
3.2
TCP Header31
4.1
Routing Process......38
4.2
Router access modes..38
5.1
Static routing..45
5.2
Default routing...46
5.3
Distance vector routing..47
5.4
Flash updates..50
5.5
Split horizon...50
5.6
Configuring RIP.52
5.7
Autonomous system...59
5.8
Router ID60
5.9
Autonomous system...60
5.10
OSPF Hierarchical Model..61
5.11
LSA Flooding in OSPF..62
5.12
OSPF..63
6.1
Flow chart of Inbound ACL..66

6.2

Configuring ACL.......67

Vous aimerez peut-être aussi