TCP/IP Security and IPv6

Networking    |    Intermediate
  • 25 videos | 52m 38s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 26 users Rating 4.6 of 26 users (26)
Any discussion of networking would not be complete without addressing information security. The TCP/IP protocols were not originally designed with security in mind. In this course, you'll explore common vulnerabilities at each layer of the TCP/IP module and common mitigations for those security weaknesses. You'll learn the components of the CIA triad, as well as some vulnerabilities and attacks at each of the four layers of the TCP/IP model. Next, you'll examine the network access layer security protocols, the components of IPsec, and the phases of an IPsec session. You'll learn about the role of virtual private networking in providing TCP/IP security. Finally, you'll explore how Transport Layer Security, Domain Name System Security Extensions, and Secure Shell Protocol are involved in TCP/IP security. Internet Protocol version 4 is now more than 30 years old. Among other consequences of its advancing age, the public Internet has depleted the available addresses that can be assigned. While several efforts have been developed to address this problem, the true solution is in the implementation of Internet Protocol version 6. In this course, you'll also explore the three categories of IPv6 address and their format and structure. You'll learn the process of mapping an IEEE MAC address into a 64-bit EUI format for IPv6 address. You'll also examine the types of IPv6 address, the characteristics of the IPv6 header, and the common types of ICMPv6 messages. Finally, you'll learn to describe changes to the DNS records with IPv6 and about modifications to common routing protocols used with IPv6. This course was originally created by Global Knowledge (GK).

WHAT YOU WILL LEARN

  • Recognize threats to tcp/ip networks
    Describe the cia triad and aaa
    Recognize tcp/ip vulnerabilities at the network access layer
    Recognize tcp/ip vulnerabilities at the internet layer
    Recognize tcp/ip vulnerabilities at the transport layer
    Recognize tcp/ip vulnerabilities at the application layer
    Recognize security protocols that can be used at tcp/ip model layers
    Describe network access security tools
    Describe ip security (ipsec) and how it can be implemented
    Describe the purpose and characteristics of virtual private networks
    Describe the purpose of transport layer security (tls) and its predecessor secure socket layer (ssl)
    Recognize the types of attacks that can be mitigated with domain name system security extensions (dnssec)
    Describe secure shell protocol (ssh) and its purpose
  • Recognize the issues with the lack of remaining ipv4 addresses and why the adoption process for ipv6 has been slow
    Describe the three categories of ipv6 addresses
    Describe the composition of ipv6 addresses
    Describe the global unicast address format
    Recognize which bits of the ipv6 address are the interface id and how it is constructed
    Describe the different types of ipv6 addresses
    Describe the elements of the ipv6 header
    Describe the optional ipv6 header extensions
    Describe changes to the internet control messaging protocol (icmp) for ipv6
    Describe how the domain name system (dns) has been extended to support ipv6
    Describe how routing services and protocols have been extended to support ipv6
    Describe internet2 and its purpose

IN THIS COURSE

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 80 users Rating 4.6 of 80 users (80)
Rating 4.6 of 20 users Rating 4.6 of 20 users (20)
Rating 4.8 of 20 users Rating 4.8 of 20 users (20)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.4 of 17 users Rating 4.4 of 17 users (17)
Rating 4.6 of 85 users Rating 4.6 of 85 users (85)
Rating 4.3 of 12 users Rating 4.3 of 12 users (12)