1. | ![]() |
Course orientation and Introduction | Brief introduction for network security | ![]() |
2. | ![]() |
Introduction and Secure routing | Terminology on network security, OSI 7 layers model & TCP/IP model, ISO/OSI Reference model for networks, DiD, MLS | ![]() |
3. | ![]() |
Network equipment vulnerability analysis | Network equipment, Exploit tool, Network device | ![]() |
4. | ![]() |
Firewall's past and future | Firewall, Host, Bastion host, Dual-homed host, Network address translation (NAT) | ![]() |
5. | ![]() |
Designing Firewalls and VPN | Designing Firewalls, Virtual Private Network | ![]() |
6. | ![]() |
IP Traceback: packtet marking | IP Traceback: packtet marking | ![]() |
7. | ![]() |
IP Security | IPSec architecture and components, Benefits and applications of IPSec | ![]() |
8. | ![]() |
Intrusion detection vs. Intrusion prevention | Intrusion detection system, Intrusion prevention system, NIDS | ![]() |
9. | ![]() |
Network Security Algorithm | String similarity, Zero-day attack analysis, Detecting worms | ![]() |
10. | ![]() |
DoS and DDoS | DoS attack examples, Types of DoS attack, DoS defense problems, DDoS attack procedures, DDoS attack defense mechanism | ![]() |
11. | ![]() |
DDoS and BOTNET | BOTNET as ransomeware, Traditional type of BOTNET, DNS sinkhole and traffic shunt | ![]() |