Internet Security Technology and Hacking

Internet Security Technology and Hacking

License / Price: Freeware
Language: English
File size: 26 MB
In recent times, internet security technology and hacking had already evolved and are one of the industrial sectors with the most rapid development. Security of information is at the top on everyone's agenda. Companies need to guarantee information is protected, and IT professionals who know how to do so are trying to garner.

  • Chapter 1
“Overview of Network Security,” introduces principles of network security, security models, and a basic overview of security standards, policies, and the network security framework.
  • Chapter 2,
    “Access Control,” describes the capability to perform traffic filtering using access control lists (ACL). It covers numerous types of ACL, such as standard and extended ACL, Lock-and-key, Reflexive, Time-based, Receive ACL, Infrastructure ACL, and Transit ACL. The chapter addresses traffic filtering based on RFC standards and best common practices.
  • Chapter 3,
    “Device Security,” covers some of the most common techniques used for device hardening and securing management access for routers, firewall appliances, and the intrusion prevention system (IPS) appliance.
  • Chapter 4,
    “Security Features on Switches,” provides a comprehensive set of security features available on the switches. The chapter covers port-level security controls at Layer 2 and security features and best practices available on the switch.
  • Chapter 5,
    “Cisco IOS Firewall,” introduces the software-based IOS firewall features, including the legacy Context-Based Access Control (CBAC) and the newly introduced Zone-Based Policy Firewall (ZFW) feature available on the router.

Post a Comment

0 Comments