Communication and Network Security

Open Systems Interconnection Reference model

    1. Protocol
    2. Application Layer
    3. Presentation Layer
    4. Session Layer
    5. Transport Layer
    6. Network Layer
    7. Data Link Layer
    8. Physical Layer
    9. Functions and Protocols in the OSI Model
    10. Tying the Layers Together
    11. Multilayer Protocols

      TCP/IP Model

        1. TCP
        2. IP Addressing
        3. IPv6
        4. Layer 2 Security Standards
        5. Converged Protocols

          Types of Transmission

            1. Analog and Digital
            2. Asynchronous and Synchronous
            3. Broadband and Baseband

              Cabling

                1. Coaxial Cable
                2. Twisted-Pair Cable
                3. Fibre-Optic Cable
                4. Cabling Problems

                  Networking Foundations

                    1. Network Topology
                    2. Media Access Technologies
                    3. Transmission Methods
                    4. Network Protocols and Services
                    5. Domain Name Service
                    6. E-mail Services
                    7. Network Address Translation
                    8. Routing Protocols

                      Networking Devices

                        1. Repeaters
                        2. Bridges
                        3. Routers
                        4. Switches
                        5. Gateways
                        6. PBXs
                        7. Firewalls
                        8. Proxy Servers
                        9. Honeypot
                        10. Unified Threat Management
                        11. Content Distribution Networks
                        12. Software Defined Networking

                          Intranets and Extranets
                          Metropolitan Area Networks

                            1. Metro Ethernet

                              Wide Area Networks

                                1. Telecommunications Evolution
                                2. Dedicated Links
                                3. WAN Technologies

                                  Remote Connectivity

                                    1. Dial-up Connections
                                    2. ISDN
                                    3. DSL
                                    4. Cable Modems
                                    5. VPN
                                    6. Authentication Protocols

                                      Wireless Networks

                                        1. Wireless Communication Techniques
                                        2. WLAN Components
                                        3. Evolution of WLAN Security
                                        4. Wireless Standards
                                        5. Best Practices for Securing WLANs
                                        6. Satellites
                                        7. Mobile Wireless Communication

                                          Network Encryption

                                            1. Link Encryption vs. End-to-End Encryption
                                            2. E-mail Encryption
                                            3. Internet Security

                                              Network Attacks

                                                1. Denial of Service
                                                2. Sniffing 
                                                3. DNS Hijacking 
                                                4. Drive-by Download

                                                Comments

                                                Popular posts from this blog

                                                OIM 11g Custom ADF Application Development

                                                Oracle Identity Manager (OIM) Interview Questions

                                                OIM 11g R2 PS2 : SOA Approval Workflow Sample