Information Security: Securing Networking Protocols
IT Security
| Beginner
- 10 videos | 56m 2s
- Includes Assessment
- Earns a Badge
Learners can explore the key concept of the common protocols in use, and discover the security issues of the transmission control protocol/Internet protocol (TCP/IP) model and security protocols, in this 10-video course. You will begin by taking a look at the common protocols used in a network, the ports they use, and the type they are and what they do. Next, you will examine some of the security issues of the TCP/IP model at the layer level, of which it has four: application, transport, Internet, and data link. You will also explore the threats, vulnerabilities, and mitigation techniques in network security; identify the types of weak protocols and their replacements; and classify the various types of security protocols. Then learners will continue by examining various ways to use security protocols in different situations; the importance of implementing security protocols. In the final tutorial, learners will explore the security-first mindset and its necessity.
WHAT YOU WILL LEARN
-
Introduce the key concepts of the courseList the common protocols used in a networkIdentify some of the security issues of the tcp/ip model at the layer levelList the threats, vulnerabilities, and mitigation techniques in a network securityIdentify the types of weak protocols and their replacements
-
Classify the various types of security protocolsIdentify the ways to use security protocols in different situationsDescribe the importance of implementing security protocolsDescribe the security-first mindset and its necessitySummarize the key concepts covered in this course
IN THIS COURSE
-
1m 29s
-
7m 29sUpon completion of this video, you will be able to list the common protocols used in a network. FREE ACCESS
-
8m 45sIn this video, you will identify some of the security issues of the TCP/IP model at the network layer. FREE ACCESS
-
14m 28sUpon completion of this video, you will be able to list the threats, vulnerabilities, and mitigation techniques for network security. FREE ACCESS
-
4m 24sLearn how to identify the types of weak protocols and how to replace them. FREE ACCESS
-
3m 52sFind out how to classify the various types of security protocols. FREE ACCESS
-
2m 16sDuring this video, you will learn how to identify the ways to use security protocols in different situations. FREE ACCESS
-
3m 28sUpon completion of this video, you will be able to describe the importance of implementing security protocols. FREE ACCESS
-
8m 58sUpon completion of this video, you will be able to describe the security-first mindset and why it is necessary. FREE ACCESS
-
55s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.