Information Security: Securing Networking Protocols

IT Security    |    Beginner
  • 10 videos | 56m 2s
  • Includes Assessment
  • Earns a Badge
Rating 4.4 of 38 users Rating 4.4 of 38 users (38)
Learners can explore the key concept of the common protocols in use, and discover the security issues of the transmission control protocol/Internet protocol (TCP/IP) model and security protocols, in this 10-video course. You will begin by taking a look at the common protocols used in a network, the ports they use, and the type they are and what they do. Next, you will examine some of the security issues of the TCP/IP model at the layer level, of which it has four: application, transport, Internet, and data link. You will also explore the threats, vulnerabilities, and mitigation techniques in network security; identify the types of weak protocols and their replacements; and classify the various types of security protocols. Then learners will continue by examining various ways to use security protocols in different situations; the importance of implementing security protocols. In the final tutorial, learners will explore the security-first mindset and its necessity.

WHAT YOU WILL LEARN

  • Introduce the key concepts of the course
    List the common protocols used in a network
    Identify some of the security issues of the tcp/ip model at the layer level
    List the threats, vulnerabilities, and mitigation techniques in a network security
    Identify the types of weak protocols and their replacements
  • Classify the various types of security protocols
    Identify the ways to use security protocols in different situations
    Describe the importance of implementing security protocols
    Describe the security-first mindset and its necessity
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 29s
  • 7m 29s
    Upon completion of this video, you will be able to list the common protocols used in a network. FREE ACCESS
  • Locked
    3.  Security Issues of TCP/IP Model
    8m 45s
    In this video, you will identify some of the security issues of the TCP/IP model at the network layer. FREE ACCESS
  • Locked
    4.  Threats, Vulnerabilities, and Mitigation
    14m 28s
    Upon completion of this video, you will be able to list the threats, vulnerabilities, and mitigation techniques for network security. FREE ACCESS
  • Locked
    5.  Weak Protocols and Their Replacements
    4m 24s
    Learn how to identify the types of weak protocols and how to replace them. FREE ACCESS
  • Locked
    6.  Types of Security Protocols
    3m 52s
    Find out how to classify the various types of security protocols. FREE ACCESS
  • Locked
    7.  Uses of Security Protocols
    2m 16s
    During this video, you will learn how to identify the ways to use security protocols in different situations. FREE ACCESS
  • Locked
    8.  Importance of Security Protocols
    3m 28s
    Upon completion of this video, you will be able to describe the importance of implementing security protocols. FREE ACCESS
  • Locked
    9.  The Security-First Mindset
    8m 58s
    Upon completion of this video, you will be able to describe the security-first mindset and why it is necessary. FREE ACCESS
  • Locked
    10.  Course Summary
    55s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 5 users Rating 4.6 of 5 users (5)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 4.9 of 22 users Rating 4.9 of 22 users (22)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.4 of 178 users Rating 4.4 of 178 users (178)
Rating 4.5 of 13 users Rating 4.5 of 13 users (13)
Rating 4.2 of 19 users Rating 4.2 of 19 users (19)