Network security

Go to class
Write Review

Network security provided by OpenLearn is a comprehensive online course, which lasts for 25 hours worth of material. Upon completion of the course, you can receive an e-certificate from OpenLearn. The course is taught in Englishand is Free Certificate. Visit the course page at OpenLearn for detailed price information.

Overview
  • Encryption of files and firewalls are just some of the security measures that can be used in security. This free course, Network security, which assumes you have a substantial knowledge of ...

Syllabus
    • Introduction
    • Learning outcomes
    • 1 Terminology and abbreviations
    • 1 Terminology and abbreviations
    • 1.1 Terminology
    • 1.2 Abbreviations
    • 2 Background to network security
    • 2 Background to network security
    • 2.1 Introduction
    • 2.2 The importance of effective network security strategies
    • 2.3 Network security when using your computer
    • 3 Threats to communication networks
    • 3 Threats to communication networks
    • 3.1 How have network security measures developed over the past fifty years?
    • 3.2 Important terminology and information for making the most of this section
    • 3.3 Passive attacks
    • 3.4 Active attacks
    • 3.5 Potential network vulnerabilities
    • 3.6 Tapping into transmission media
    • 4 Principles of encryption
    • 4 Principles of encryption
    • 4.1 An introduction to encryption and cryptography
    • 4.2 An overview of symmetric key systems
    • 4.3 The components of a symmetric key system
    • 4.4 Asymmetric key systems
    • 4.5 Vulnerability to attack
    • 4.6 Hybrid systems
    • 5 Implementing encryption in networks
    • 5 Implementing encryption in networks
    • 5.1 Overview
    • 5.2 Link layer encryption
    • 5.3 End-to-end encryption
    • 5.3.1 Network layer encryption
    • 5.3.2 Application layer encryption
    • 5.4 Link layer encryption and end-to-end encryption compared and combined
    • 6 Integrity
    • 6 Integrity
    • 6.1 Encryption and integrity
    • 6.2 Other ways of providing assurance of integrity
    • 7 Freshness
    • 7 Freshness
    • 7.1 Introduction
    • 7.2 Time stamps
    • 7.3 Sequence numbers
    • 7.4 Nonces
    • 8 Authentication
    • 8 Authentication
    • 8.1 Overview of authentication methods
    • 8.2 Certification authorities and digital certificates
    • 9 Access control
    • 9 Access control
    • 9.1 Introduction
    • 9.2 Passwords
    • 9.3 Firewalls – an overview
    • 9.4 Packet-filtering router
    • 9.5 Application level gateways
    • 9.6 Circuit level gateways
    • 9.7 Examples of firewall implementation
    • Conclusion
    • 10.1 Summary of Sections 1–5
    • 10.2 Summary of Sections 6–9
    • References
    • Acknowledgements