- 3
- 0
- 约1.49千字
- 约 75页
- 2020-03-20 发布于湖南
- 举报
CCNA Security;Lesson Planning;Major Concepts;Lesson Objectives;Lesson Objectives;What is Network Security?;Rationale for Network Security;Cyber Crime;Business Impact;Proliferation of Threats;Sophistication of Threats;Legislation;Goals of an Information Security Program;;;;;;Risk Management ;Risk Management;Risk Assessment;Asset Identification;Network Security “Threat”;Types of Network Threats;Vulnerability;Vulnerability Appraisal;Risk Management Terms;Understanding Risk;Qualitative Risk Analysis;Quantitative Risk Analysis;Managing Risks;Types of Attacks;Types of Attacks;Types of Attacks;Specific Network Attacks;Denial-of-Service Facts;Denial-of-Service Example;Types of Denial-of-Service Attacks;DoS - Buffer Overflow Attacks;DoS - SYN Flood Attack;DoS - Teardrop Attack;DoS - Smurf Attack;DoS - DNS Attacks;DoS - Email Attacks;DoS - Physical Infrastructure Attacks;DoS - Viruses/Worms;Malicious Code Attacks;Packet Sniffing Attacks;Information Leakage Attacks;Social Engineering Attacks;Attack Methodology;Stages of an Attack;Tools of the Attacker;Countermeasures;Countermeasure Selection;Security Administration;What Is a Security Policy?;Change Drivers;Documents Supporting Policies;Example: The Policy;Example: The Standards;Example: The Guideline;Example: The Procedure;Policy Elements;Policy Elements, 2;Policy Example;
;SANS;CERT;Systems Security Certified Practitioner (SCCP);Network Security Jobs ;Network Security Jobs;Network Security Jobs, 2 ;Network Security Jobs, 3
原创力文档

文档评论(0)