Information Security: Securing Networking Protocols

IT Security    |    Beginner
  • 10 videos | 56m 2s
  • Includes Assessment
  • Earns a Badge
Learners can explore the key concept of the common protocols in use, and discover the security issues of the transmission control protocol/Internet protocol (TCP/IP) model and security protocols, in this 10-video course. You will begin by taking a look at the common protocols used in a network, the ports they use, and the type they are and what they do. Next, you will examine some of the security issues of the TCP/IP model at the layer level, of which it has four: application, transport, Internet, and data link. You will also explore the threats, vulnerabilities, and mitigation techniques in network security; identify the types of weak protocols and their replacements; and classify the various types of security protocols. Then learners will continue by examining various ways to use security protocols in different situations; the importance of implementing security protocols. In the final tutorial, learners will explore the security-first mindset and its necessity.

WHAT YOU WILL LEARN

  • Introduce the key concepts of the course
    List the common protocols used in a network
    Identify some of the security issues of the tcp/ip model at the layer level
    List the threats, vulnerabilities, and mitigation techniques in a network security
    Identify the types of weak protocols and their replacements
  • Classify the various types of security protocols
    Identify the ways to use security protocols in different situations
    Describe the importance of implementing security protocols
    Describe the security-first mindset and its necessity
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 29s
  • 7m 29s
    Upon completion of this video, you will be able to list the common protocols used in a network. FREE ACCESS
  • Locked
    3.  Security Issues of TCP/IP Model
    8m 45s
    In this video, you will identify some of the security issues of the TCP/IP model at the network layer. FREE ACCESS
  • Locked
    4.  Threats, Vulnerabilities, and Mitigation
    14m 28s
    Upon completion of this video, you will be able to list the threats, vulnerabilities, and mitigation techniques for network security. FREE ACCESS
  • Locked
    5.  Weak Protocols and Their Replacements
    4m 24s
    Learn how to identify the types of weak protocols and how to replace them. FREE ACCESS
  • Locked
    6.  Types of Security Protocols
    3m 52s
    Find out how to classify the various types of security protocols. FREE ACCESS
  • Locked
    7.  Uses of Security Protocols
    2m 16s
    During this video, you will learn how to identify the ways to use security protocols in different situations. FREE ACCESS
  • Locked
    8.  Importance of Security Protocols
    3m 28s
    Upon completion of this video, you will be able to describe the importance of implementing security protocols. FREE ACCESS
  • Locked
    9.  The Security-First Mindset
    8m 58s
    Upon completion of this video, you will be able to describe the security-first mindset and why it is necessary. FREE ACCESS
  • Locked
    10.  Course Summary
    55s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.