TCP/IP Security and IPv6
Networking
| Intermediate
- 25 videos | 52m 38s
- Includes Assessment
- Earns a Badge
Any discussion of networking would not be complete without addressing information security. The TCP/IP protocols were not originally designed with security in mind. In this course, you'll explore common vulnerabilities at each layer of the TCP/IP module and common mitigations for those security weaknesses. You'll learn the components of the CIA triad, as well as some vulnerabilities and attacks at each of the four layers of the TCP/IP model. Next, you'll examine the network access layer security protocols, the components of IPsec, and the phases of an IPsec session. You'll learn about the role of virtual private networking in providing TCP/IP security. Finally, you'll explore how Transport Layer Security, Domain Name System Security Extensions, and Secure Shell Protocol are involved in TCP/IP security. Internet Protocol version 4 is now more than 30 years old. Among other consequences of its advancing age, the public Internet has depleted the available addresses that can be assigned. While several efforts have been developed to address this problem, the true solution is in the implementation of Internet Protocol version 6. In this course, you'll also explore the three categories of IPv6 address and their format and structure. You'll learn the process of mapping an IEEE MAC address into a 64-bit EUI format for IPv6 address. You'll also examine the types of IPv6 address, the characteristics of the IPv6 header, and the common types of ICMPv6 messages. Finally, you'll learn to describe changes to the DNS records with IPv6 and about modifications to common routing protocols used with IPv6. This course was originally created by Global Knowledge (GK).
WHAT YOU WILL LEARN
-
Recognize threats to tcp/ip networksDescribe the cia triad and aaaRecognize tcp/ip vulnerabilities at the network access layerRecognize tcp/ip vulnerabilities at the internet layerRecognize tcp/ip vulnerabilities at the transport layerRecognize tcp/ip vulnerabilities at the application layerRecognize security protocols that can be used at tcp/ip model layersDescribe network access security toolsDescribe ip security (ipsec) and how it can be implementedDescribe the purpose and characteristics of virtual private networksDescribe the purpose of transport layer security (tls) and its predecessor secure socket layer (ssl)Recognize the types of attacks that can be mitigated with domain name system security extensions (dnssec)Describe secure shell protocol (ssh) and its purpose
-
Recognize the issues with the lack of remaining ipv4 addresses and why the adoption process for ipv6 has been slowDescribe the three categories of ipv6 addressesDescribe the composition of ipv6 addressesDescribe the global unicast address formatRecognize which bits of the ipv6 address are the interface id and how it is constructedDescribe the different types of ipv6 addressesDescribe the elements of the ipv6 headerDescribe the optional ipv6 header extensionsDescribe changes to the internet control messaging protocol (icmp) for ipv6Describe how the domain name system (dns) has been extended to support ipv6Describe how routing services and protocols have been extended to support ipv6Describe internet2 and its purpose
IN THIS COURSE
-
1m 21s
-
3m 15s
-
1m 40s
-
2m 20s
-
3m 4s
-
1m 2s
-
1m 2s
-
2m 42s
-
3m 57s
-
1m 31s
-
2m 55s
-
2m 27s
-
2m 13s
-
1m 51s
-
1m 51s
-
3m 7s
-
49s
-
53s
-
1m 33s
-
1m 55s
-
1m 59s
-
6m 15s
-
54s
-
46s
-
1m 17s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.