Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

Learning Route sharing on computer Network Security

2025-01-19 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)06/01 Report--

Master the learning route of computer network security course and avoid detours in the process of learning. Students engaged in enterprise network administrators or computer network security work need to master the relevant knowledge of computer network security. According to the layered idea of computer communication, this paper explains the network security, the network security threat faced by the physical layer, the network security of the data link layer, the security of the network layer and the security of the transport layer.

The learning route of computer network security course is as follows:

Skills to be mastered in 1.IT operation and maintenance position

two。 Physical layer security of computer communication

3. Data link layer security [free try

4. Configure switch port security

5. Configure the router to use standard ACL to control traffic

6. Routers use extended ACL to control data traffic

Security threats to 7.ARP Protocol

8. Network marshals

9. Lan password sniffing

10. Domain name resolution spoofing

11.P2P Terminator controls the Internet bandwidth of computers in this network.

12.ARP Firewall prevents ARP spoofing

13. Session layer * *-SYN**

14. Session layer * *-LAND**

15. Denial of Service *-- DOS**

16. Distributed denial of Service * * DDOS-** website

17. Preliminary knowledge of network security

18. Port scan ready * *

19.Windows Firewall blocking * * behavior

20.TCP/IP filtering to realize server network security

21. Make Trojans to control the server

22.IPSec strictly controls the network traffic to and from the server.

23.IPSec implements encrypted communication-pre-shared secret key for authentication

24. IPSec Authentication based on Digital Certificate

25. Set up IPSec--Kerberos authentication for computers in the domain

26.IPSec use case-profile server allows access only to computers in the domain

twenty-seven。 Use Group Policy to set IPSec

28.Windows2008R2 Advanced Security Firewall

twenty-nine。 Firewall profile and outbound control

Implementing IPSec with 30.WindowsServer2008R2

31.Window2008R2 Advanced Security Firewall Kerberos Authentication

32.Windows2008R2 Advanced Security Firewall uses Digital formal Authentication

thirty-three。 Example: enterprise Web server network security solution

thirty-four。 Capture the login account and password of the Wifi user.

thirty-five。 Configure Windows to realize port forwarding

36.WindowsXP Firewall Settings

37.Windows7 Advanced Security Firewall

What is shared above is about the learning route of computer network security. If you are interested, you can pay more attention to learning by yourself. If you want to know more, please follow the official website.

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report