X

Security Basics

Welcome to the Lesson 11.Our goal here is to give you the terminology, the words that your customers are going to want you to know and want you to be able to converse with.

IDS Attack Detection

Some of the different kinds of things that an Intrusion Detection System or IDS might detect would be looking in… Read More

Active Audit Network Vulnerability Assessment

Why Active Audit? Why is active audit necessary? Many companies rely on their perimeter security. Perimeter can be breached most… Read More

IKE—Internet Key Exchange

IPSec assumes that a security association or SA is in place, but does have a mechanism for creating that association.… Read More

Performance Requirements in a Firewall and IPSec

High performance in a firewall is critical. This is driven not only by your end user community, but by some… Read More

Packet-Filtering Routers

There are a few different types of firewalls. Here’s a little history.The traditional approach was access routers. Using access control… Read More

Access Control Lists and Firewalls

Policy Enforcement Using Access Control Lists Now we're going to look at policy enforcement using Access Control Lists. We want… Read More

Integrity – Network Availability

Integrity Let's look at some of the different integrity solutions. Integrity—Network Availability One of the functions of integrity is making… Read More

Network Address Translation

Let’s explore another methodology of making sure that your system is safe. This is different than the other ones we’ve… Read More

The Kerberos Authentication technology

User Authentication with Kerberos Kerberos is another technology. It is one that has been broken into historically; however, it provides… Read More

Authentication and Accounting Protocols

RADIUS RADIUS is an access server authentication and accounting protocol that has gained wide support. The RADIUS authentication server maintains… Read More