Curriculum
- 1 Section
- 21 Lessons
- 10 Weeks
Expand all sectionsCollapse all sections
- Network Security By Eng-Muhammed Essa21
- 2.1Introduction Part 115 Minutes
- 2.2Introduction Part 213 Minutes
- 2.3Security Information and Event Management14 Minutes
- 2.4Risk Management8 Minutes
- 2.5Network Security9 Minutes
- 2.6Domains for Security Controls and Requirements14 Minutes
- 2.7IT Security DMZ or demilitarized zone12 Minutes
- 2.8Common types of cyber attacks Part 112 Minutes
- 2.9Common types of cyber attacks Part 27 Minutes
- 2.10Social Engineering Attacks10 Minutes
- 2.11Malware, or malicious software9 Minutes
- 2.12Data loss prevention DLP Part 112 Minutes
- 2.13Data loss prevention DLP Part 215 Minutes
- 2.14Cryptography Techniques5 Minutes
- 2.15Symmetric cryptography10 Minutes
- 2.16Symmetric cryptography DES, 3DES, IDEA, AES, Blowfish7 Minutes
- 2.17Asymmetric cryptography algorithms13 Minutes
- 2.18Hashing algorithm cryptographic hash function11 Minutes
- 2.19Key Exchange14 Minutes
- 2.20PKI Public Key Infrastructure Certificate authorities13 Minutes
- 2.21Hierarchical internetworking model core layer, distribution layer, access layer17 Minutes
This content is protected, please login and enroll in the course to view this content!
PKI Public Key Infrastructure Certificate authorities
Prev