Information Security: Securing Networking Protocols

IT Security
  • 10 Videos | 1h 2s
  • Includes Assessment
  • Earns a Badge
Likes 15 Likes 15
Learners can explore the key concept of the common protocols in use, and discover the security issues of the transmission control protocol/Internet protocol (TCP/IP) model and security protocols, in this 10-video course. You will begin by taking a look at the common protocols used in a network, the ports they use, and the type they are and what they do. Next, you will examine some of the security issues of the TCP/IP model at the layer level, of which it has four: application, transport, Internet, and data link. You will also explore the threats, vulnerabilities, and mitigation techniques in network security; identify the types of weak protocols and their replacements; and classify the various types of security protocols. Then learners will continue by examining various ways to use security protocols in different situations; the importance of implementing security protocols. In the final tutorial, learners will explore the security-first mindset and its necessity.

WHAT YOU WILL LEARN

  • introduce the key concepts of the course
    list the common protocols used in a network
    identify some of the security issues of the TCP/IP model at the layer level
    list the threats, vulnerabilities, and mitigation techniques in a network security
    identify the types of weak protocols and their replacements
  • classify the various types of security protocols
    identify the ways to use security protocols in different situations
    describe the importance of implementing security protocols
    describe the security-first mindset and its necessity
    summarize the key concepts covered in this course

IN THIS COURSE

  • Playable
    1. 
    Course Overview
    1m 29s
    UP NEXT
  • Playable
    2. 
    Common Protocols
    7m 29s
  • Locked
    3. 
    Security Issues of TCP/IP Model
    8m 45s
  • Locked
    4. 
    Threats, Vulnerabilities, and Mitigation
    14m 28s
  • Locked
    5. 
    Weak Protocols and Their Replacements
    4m 24s
  • Locked
    6. 
    Types of Security Protocols
    3m 52s
  • Locked
    7. 
    Uses of Security Protocols
    2m 16s
  • Locked
    8. 
    Importance of Security Protocols
    3m 28s
  • Locked
    9. 
    The Security-First Mindset
    8m 58s
  • Locked
    10. 
    Course Summary
    55s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE