Network Security – Protocols
Course Description
Learn more fundamentals of network security, including cryptographic algorithms used in networking protocols, TLS/SSL, IPSec Layer 2 Security and Wireless Security.
Among the topics covered are cryptographic algorithms used in networking protocols, TLS/SSL, IPSec Layer 2 Security, and Wireless Security. The material is essential in later classes that will develop ethical hacking skills. Students are provided with a broad understanding of cryptography, from its classical applications dating from the Roman empire to modern cryptography, including the public key cryptography and hashing techniques today. Next, we take what we learned about cryptography and apply it as a tool against attackers. Specifically, we'll discuss IP Security, TLS/SSL, and its use in Virtual Private Networks. We follow up with coverage of Layer 2 security and vulnerabilities, such as MAC attacks, VLAN hopping attacks, DHCP attacks, ARP attacks, spoofing attacks, and attacks on other protocols. We'll also go over common countermeasures to these attacks. We conclude the course with an overview of how WiFi works, basic terminology and architecture, and how wireless networks are secured.
What you'll learn
• Define and apply a substitution cipher
• Define cryptanalysis
• Explain at a high level the process by which a plaintext message is encrypted, transmitted, and decrypted.
• Describe at least two strategies for breaking an encryption scheme
• Identify the differences between public key encryption, symmetric key encryption, and hashing
• List and summarize the characteristics of good ciphers
• Describe the vulnerabilities of stream ciphers
• Define AES and explain why it is recommended over 3DES
• Define cipher block chaining
• List the steps in creating an RSA public/private key pair
• Explain why RSA is secure
• Define message integrity and explain how it is ensured
• Define IPSec and list its services
• Define authentication header and ESP
• Explain the primary goal of IKE and describe its sub-protocols
• Summarize the five steps of IPSec Operation
• Summarize the history of SSL
• Explain how closure alerts can prevent a truncation attack
• Identify the protocols that make up the SSL architecture
• Describe how SSL/TLS provides protected channels
• State the differences between IPSec and SSL VPN connections
• Explain why it's important to consider Layer 2 security
• Define common Layer 2 attacks
• Identify tools used in Layer 2 attacks
• Describe countermeasures to Layer 2 attacks and security best practices to prevent attacks
• Explain the differences between the 2.4GHz and 5GHz spectrums
• Provide definitions of basic wireless terms
• Explain how 802.11ac differs from earlier 802.11 standards
• Identify and define the types of 802.11 frames
• List and define the states of 802.11 sessions
• List the steps in establishing an 802.11 session
• Summarize the existing wireless security protocols and state which protocols should not be used
• Summarize WPA, WPA Enterprise, and generalized WiFi attacks
Course Info
- Prerequisites: No
There are no reviews yet.