Network Security - Protocols

Aspen Olmsted, NYUx

Learn more fundamentals of network security, including cryptographic algorithms used in networking protocols, TLS/SSL, IPSec Layer 2 Security and Wireless Security.

This is a self-paced course that provides a continuation of network security topics. Among the topics covered are cryptographic algorithms used in networking protocols, TLS/SSL, IPSec Layer 2 Security, and Wireless Security. The material is essential in later classes that will develop ethical hacking skills. Students are provided with a broad understanding of cryptography, from its classical applications dating from the Roman empire to modern cryptography, including the public key cryptography and hashing techniques today. Next, we take what we learned about cryptography and apply it as a tool against attackers. Specifically, we'll discuss IP Security, TLS/SSL, and its use in Virtual Private Networks. We follow up with coverage of Layer 2 security and vulnerabilities, such as MAC attacks, VLAN hopping attacks, DHCP attacks, ARP attacks, spoofing attacks, and attacks on other protocols. We'll also go over common countermeasures to these attacks.
We conclude the course with an overview of how WiFi works, basic terminology and architecture, and how wireless networks are secured.

What will you learn

  1. Define and apply a substitution cipher
  2. Define cryptanalysis
  3. Explain at a high level the process by which a plaintext message is encrypted, transmitted, and decrypted.
  4. Describe at least two strategies for breaking an encryption scheme
  5. Identify the differences between public key encryption, symmetric key encryption, and hashing
  6. List and summarize the characteristics of good ciphers
  7. Describe the vulnerabilities of stream ciphers
  8. Define AES and explain why it is recommended over 3DES
  9. Define cipher block chaining
  10. List the steps in creating an RSA public/private key pair
  11. Explain why RSA is secure
  12. Define message integrity and explain how it is ensured
  13. Define IPSec and list its services
  14. Define authentication header and ESP
  15. Explain the primary goal of IKE and describe its sub-protocols
  16. Summarize the five steps of IPSec Operation
  17. Summarize the history of SSL
  18. Explain how closure alerts can prevent a truncation attack
  19. Identify the protocols that make up the SSL architecture
  20. Describe how SSL/TLS provides protected channels
  21. State the differences between IPSec and SSL VPN connections
  22. Explain why it's important to consider Layer 2 security
  23. Define common Layer 2 attacks
  24. Identify tools used in Layer 2 attacks
  25. Describe countermeasures to Layer 2 attacks and security best practices to prevent attacks
  26. Explain the differences between the 2.4GHz and 5GHz spectrums
  27. Provide definitions of basic wireless terms
  28. Explain how 802.11ac differs from earlier 802.11 standards
  29. Identify and define the types of 802.11 frames
  30. List and define the states of 802.11 sessions
  31. List the steps in establishing an 802.11 session
  32. Summarize the existing wireless security protocols and state which protocols should not be used
  33. Summarize WPA, WPA Enterprise, and generalized WiFi attacks

  • 2020年12月02日
  • 免费:
  • 收费:
  • 证书:
  • MOOC:
  • 视频讲座:
  • 音频讲座:
  • Email-课程:
  • 语言: 英语 Gb



请注册, 为了写反馈

Small-icon.hover Computer Networks
The Internet is a computer network that millions of people use every day. Understand...
Extensionflag Internet Voice, Video, and Telepresence
Video and voice are taking over the Internet and these systems are...
Extensionflag Introduction to Cryptography
This course teaches algorithms to guarantee privacy and authenticity...
6-857f03 Network and Computer Security
6.857 is an upper-level undergraduate, first-year graduate course on network...
6-897s04 Selected Topics in Cryptography
This course covers a number of advanced "selected topics" in the field of cryptography...
795999aa-6a59-42ac-ba38-feec9ec2be7f-95fe84bc13fd.small Penetration Testing - Exploitation
Learn exploitation phase of penetration testing, including the foundations of...
2cc77eb5-e1b3-4d57-87f6-bf071804e2ab-1d34e01a3545.small Penetration Testing - Post Exploitation
Learn post-exploitation phases of penetration testing, including Owning, Pivoting...
7ca98c09-a207-40c7-8a84-b9c48ecdf920-f25c990d1f5f.small Cloud Computing Engineering and Management
Learn methods for managing cloud computing projects and build an understanding...
9395b535-1fa7-4ed4-9fd8-98b86ba682d9-98e1ff5caeec.small UX Research
In this MOOC you will learn how to connect with users at every step of a digital...
61be438f-28b9-4339-9437-21c34b3c3dd6-e9ecfcecaf58.small UX Prototyping
Become a prototyping virtuoso! Master the ability to propel your creative team...
795999aa-6a59-42ac-ba38-feec9ec2be7f-95fe84bc13fd.small Penetration Testing - Exploitation
Learn exploitation phase of penetration testing, including the foundations of...
66a5462a-1a44-4010-b419-d313d9218090-d8d4d0d32eba.small Statistical Predictive Modelling and Applications
Learn how to apply statistical modelling techniques to real-world business scenarios...
F8d26e31-a9ea-4891-8e4d-ccf3be0e10f2-af109b42c4db.small Project Finance: Funding Projects Successfully
Learn the key strategies used by project managers to generate crucial funding...
1e7ac3ee-58cb-47dd-b887-b845fca21a82-a170765fa771.small Efficient HVAC Systems
Learn how to decide on efficient combinations of energy conversion systems and...
89db1e57-5bf9-4f4e-82a1-9cdb09c6846e-f6e1130fc6b5.small Business success in the screen industries: how to pitch your script and self-produce
Learn how to network in the creative industries, how pitch your film to a producer...

© 2013-2019