In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-19 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >
Share
Shulou(Shulou.com)06/01 Report--
Master the learning route of computer network security course and avoid detours in the process of learning. Students engaged in enterprise network administrators or computer network security work need to master the relevant knowledge of computer network security. According to the layered idea of computer communication, this paper explains the network security, the network security threat faced by the physical layer, the network security of the data link layer, the security of the network layer and the security of the transport layer.
The learning route of computer network security course is as follows:
Skills to be mastered in 1.IT operation and maintenance position
two。 Physical layer security of computer communication
3. Data link layer security [free try
4. Configure switch port security
5. Configure the router to use standard ACL to control traffic
6. Routers use extended ACL to control data traffic
Security threats to 7.ARP Protocol
8. Network marshals
9. Lan password sniffing
10. Domain name resolution spoofing
11.P2P Terminator controls the Internet bandwidth of computers in this network.
12.ARP Firewall prevents ARP spoofing
13. Session layer * *-SYN**
14. Session layer * *-LAND**
15. Denial of Service *-- DOS**
16. Distributed denial of Service * * DDOS-** website
17. Preliminary knowledge of network security
18. Port scan ready * *
19.Windows Firewall blocking * * behavior
20.TCP/IP filtering to realize server network security
21. Make Trojans to control the server
22.IPSec strictly controls the network traffic to and from the server.
23.IPSec implements encrypted communication-pre-shared secret key for authentication
24. IPSec Authentication based on Digital Certificate
25. Set up IPSec--Kerberos authentication for computers in the domain
26.IPSec use case-profile server allows access only to computers in the domain
twenty-seven。 Use Group Policy to set IPSec
28.Windows2008R2 Advanced Security Firewall
twenty-nine。 Firewall profile and outbound control
Implementing IPSec with 30.WindowsServer2008R2
31.Window2008R2 Advanced Security Firewall Kerberos Authentication
32.Windows2008R2 Advanced Security Firewall uses Digital formal Authentication
thirty-three。 Example: enterprise Web server network security solution
thirty-four。 Capture the login account and password of the Wifi user.
thirty-five。 Configure Windows to realize port forwarding
36.WindowsXP Firewall Settings
37.Windows7 Advanced Security Firewall
What is shared above is about the learning route of computer network security. If you are interested, you can pay more attention to learning by yourself. If you want to know more, please follow the official website.
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.