ICT Networking and security

Size: px
Start display at page:

Download "ICT Networking and security"

Transcription

1 Post-academic course in ICT ICT Networking and security First component of a new broad ICT course Part I: Communication networks, January March 2008 Module 1: Fixed Networks Module 2: Multimedia Networks Module 3: Wireless Networks Module 4: etom Cases Part II: Security, April June 2008 Module 1: Security Basics Module 2: Security Applications Module 3: Advanced Security Configuration Module 4: Organisational Aspects Module 5: Legal Aspects Cases Business version! Extra large scale business version available via live streaming video see inside Obtain a Ghent University certificate Scientific Coordination Prof. dr. ir. Eric Laermans Prof. dr. ir. Piet Demeester Prof. dr. ir. Ingrid Moerman INSTITUUT VOOR PERMANENTE VORMING

2 introduction ICT in Continuing Education: the IVPV success story By the end of the previous century, the IVPV together with Agoria challenged the shortage in ICT-specialists by setting up a large scale IT course. For one or two evenings per week, around 2000 employees throughout Belgium and Europe faithfully attended the videoconferences organised by the Flemish universities. Many participants took exams on one or more modules, and received a university certificate. The course was a true milestone for industry, and gave a new élan to many ICT-experts. Today Agoria teaches us that again there is a growing shortage in ICT-specialists. The IVPV picks up the Agoria inquiry, and revitalizes a new large scale ICT course. As always, the course is demand driven, and the content has been set up in close collaboration with industry. Why this course? The evolution in the world of communication networks in the last decades has been rapid and thorough. We evolved from traditional, fixed telephone networks, well controlled by clearly identified operators of the user itself in the form of some spyware leaking precious information to the hacker who planted the piece of malware. Furthermore, as users and enterprises rely more and more on their network infrastructure to do business, the consequences of successful attacks have to mobile, pervasive, more open and ever more complex IP-based networks. The share of voice communication in total network traffic has dwindled, while the amount of data communication over IP-networks from new applications as file transfer, , Web, etc. has steadily risen. Even within mobile networks, data communication is taking an ever larger share with new technologies as UMTS. Today, these new data networks even compete with the The ICT Networking & security course is the first part of a large scale international ICT course organised by the Institute of Continuing Education at Ghent University. In total, five parts will be organised dealing with Multimedia (Part II), Software Engineering (Part III), Operating Systems & ICT System Management (Part IV) and Databases (Part V). All parts are scheduled within If you want to be updated about the following parts, send an to info@ivpv.ugent.be become orders of magnitude more devastating. The second objective of this course is to allow to understand which security functions and mechanisms exist, how they can be used and implemented to achieve acceptably secure communications. Who should attend? This course is aimed at people with some technological background, although they need not be experts in ICT. Only the advanced lab sessions older more traditional networks for the telephone service, as Voice-over-IP has become a fierce competitor to the historical from the fourth module of the second part require a suffi- cient experience to start. telephone operators. This course aims to present the underlying technologies of this relatively new reality. Post-academic Course Certificate granted by the Ghent University Originally, networks were typically tightly controlled by welldefined operators. Attacks against those networks were sometimes possible, allowing the hacker This programme is part of the Ghent University post-academic courses. To receive a post-academic certificate granted by Ghent University for Part I and/or to pass the bill of his communications to the victim of the hacking, but the amplitude of the attacks and their damage were generally rather limited. The openness of contemporary networks, especially IP-based networks, and the complexity and vulnerability of contemporary terminals (computers or advanced mobile devices), means that much more attention has to be spent on the Extra business edition! Follow this course worldwide. For companies interested in this course, a live streaming video of the lectures via the Internet will be available to attend locally at your business sites worldwide. Some of the lab sessions can also be organised locally in your company. For more information, contact us at: ivpv@ugent.be Part II, one should at least attend modules 1, 2 and 3 of part I and/or modules 1, 2 and 4 of part II, and successfully take exams for these. The exam will normally take place at the end of September Example questions, giving a precise idea of what can be asked at the exam, will be given in advance. Course certificates are a personal merit: participants who aspire a certificate cannot security of these networks. Attacks can come from anywhere, be replaced, others can. at any time. The attack could even originate from the terminal

3 programme Program Part I: Communication networks Module 1: Fixed Networks The basis of most contemporary fixed networks is the TCP/IP protocol stack. The objective of this module is to discuss in more detail the several layers of this stack, starting with the application layer and ending with the data link layer. At the application layer, we shall deal with the most common protocols for Web (HTTP), (SMTP, POP), file transfer (FTP),... One level lower in the protocol stack, at the transport layer, we find the well known TCP and UDP. The transport layer itself relies on the underlying network layer, where the Internet Protocol (IP) is used. At this point routing and network management tools like OSPF, BGP, ICMP, NAT, DHCP,... will also be discussed. Finally, we end with the data link layer protocols such as Ethernet or PPP. The theory from this module will be illustrated by a series of 4 lab sessions which will give the course members hands-on experience about the operation of basic IP applications, network protocols and basic network configuration. Teachers: Piet Demeester, Andy Van Maele (Lab sessions) Organisation: 3 plenary sessions theory + 4 group sessions lab exercises Reference book: Computer networking - A top-down approach featuring the internet, 4th Edition by James F. Kurose & Keith W. Ross Module 2: Multimedia Networks The second module of this part about communication networks deals with multimedia networks and the specific network requirements multimedia implies. It is in this module that we shall discuss important concepts as quality of service (QoS), multicast and the next generation of the Internet Protocol (IPv6), which offers new possibilities that are unavailable in less advanced networks and are useful for the reliable transmission of multimedia data. Voice-over-IP will be considered as a typical multimedia application. Other, more advanced, techniques that will also be dealt with are SIP (used to support Voice-over-IP), MPLS (used to support QoS),... The theory is complemented by a series of 3 lab sessions where experience will be acquired with the nature of video traffic, by configuring a network to support QoS and with SIP. Teachers: Piet Demeester, Andy Van Maele (Lab sessions) Organisation: 2 plenary sessions theory + 3 group sessions lab exercises Reference book: Computer networking - A top-down approach featuring the internet, 4th Edition by James F. Kurose & Keith W. Ross Module 3: Wireless Networks Two different kinds of wireless networks are dealt with in this module. On the one hand, we shall consider mobile communication systems relying on large cellular infrastructures, like GSM and UMTS. But the main accent of this module will lie on less institutional wireless technologies like WiMAX (wide area networks), WLAN (local networks), Bluetooth and Zigbee (personal networks) and even RFID (tagging). Teacher: Ingrid Moerman Organisation: 3 plenary sessions theory Reference book: Mobile Communications, 2 nd edition by Jochen Schiller Module 4: etom The first part is concluded by a session about etom, which is to the telecommunication industry what ITIL is to the information technology industry: a framework of best practice approaches to deliver high quality services. It deals with the more organisational, rather than technical, aspects of telecommunication networks. Teacher: Filip De Turck Organisation: 1 plenary session theory Extra module: Cases This module contains 1 session with 4 cases to give an overall illustration of the course topics. Subscription is free and automatically included. Organisation: 1 group session lab exercises Program Part II: Security Module 1: Security Basics What does information security mean? Which functions can be realised? Why do we need security? These are the questions that should be answered in the first session of this module. The main basic objectives of information security are discussed: confidentiality, authentication, data-integrity, non-repudiation and availability. We shall show what may happen if insufficient measures are taken to achieve these properties and how people with bad intentions can undermine these objectives to gain an advantage. Besides these basic security concepts, this module also deals with the concrete basic mechanisms that can be used to achieve the desired security objectives. The basic principles of conventional and asymmetric encryption, hash functions, message authentication codes, time stamps, certificates, PKI,... are explained, without plunging into the mathematical details underlying these complex techniques. Biometric techniques will also be shortly discussed here, both with their advantages and their shortcomings. Teacher: Eric Laermans Organisation: 2 plenary sessions theory Reference book: Cryptography and Network Security, Principles and Practices, 4th edition by William Stallings *1 session = 2 lectures/labs of 1.5 hr. Module 2: Security Applications Once the basic building blocks are well understood, we shall try to understand how they are used to achieve security in communication networks, at the different levels of the protocol stack: at application layer (PGP, S/MIME, SSH,...), at the transport layer (TLS/SSL) or at the network layer (IPSec). Related to these secure protocols, we shall also explain how they can be used to create VPN s. The use of these cryptographic security techniques alone is not sufficient to guarantee

4 teachers the security of computer or communication systems. System security measures protecting against malware and other intrusions are also essential. This is why we shall also discuss malware protection, firewalls and intrusion detection systems. And finally, as wireless networks are particularly open and vulnerable to attacks, we deal with the specific security measures for wireless networks: from the defective WEP to the improved WPA and WPA2. A demonstration session will illustrate the potential risks in networks, especially in WEP secured wireless local networks. The theory presented in this module is also complemented by two lab sessions about the principles of network security and about the configuration and vulnerability of a basic wireless local network secured by WEP. Teachers: Eric Laermans, Andy Van Maele (Lab sessions) Organisation: 5 plenary sessions theory + 2 group sessions lab exercises Reference book: Cryptography and Network Security, Principles and Practices, 4th edition by William Stallings Module 3: Advanced security configuration To those who are already more familiar with ICT and security, this module is devoted to the more advanced practical aspects of information security. In a series of 4 lab sessions, hands-on experience will be obtained in advanced PC security, authentication services with a RADIUS server and advanced security aspects of wireless networks. Teacher: Andy Van Maele Organisation: 1 plenary session theory + 4 group sessions lab exercises Module 4: Organisational aspects Security is not just a matter of technology. The organisational aspects certainly are not less important. In this module, we shall see how information security can be organised within a company: how security policies are designed and implemented and how a company can respond to security incidents. Attention will also be given to the control and auditing of security policies, for which CobiT is an important standard. Teacher: Marc Vael Organisation: 2 plenary sessions theory Module 5: Legal aspects The security part of this course concludes with a last module about the legal aspects of security. What activities (hacking, identity theft,...) can be considered illegal? What are the legal measures against computer crime? Another important legal aspect of information security is the protection of personal data (of customers or employees). This module also discusses the obligations a company has to achieve an acceptable level of information security. Besides protection against attacks, we also deal with the legal framework for electronic signatures and e-commerce. Teacher: Jos Dumortier Organisation: 1 plenary session theory Scientific Coordination > Prof. dr. ir. Eric Laermans > Prof. dr. ir. Piet Demeester > Prof. dr. ir. Ingrid Moerman Teachers > Piet Demeester > Jos Dumortier ICRI, KULeuven, IBBT > Filip De Turck > Eric Laermans > Ingrid Moerman > Marc Vael Executive Director at Protiviti Belgium, Brussels > Andy Van Maele This course is organised as a cooperation between the Institute for Continuing Education (IVPV) of Ghent University and the Interdisciplinary institute for BroadBand Technology (IBBT) with the support of Agoria (Belgium employers organisation and trade association). Extra module: Cases This module contains 1 session with 4 cases to give an overall illustration of the course topics. Subscription is free and automatically included. INSTITUUT VOOR PERMANENTE VORMING

5 subscription form Preferably via OR by using this form: Return completed and signed form (use capitals): Name: Mr. / Ms. First Name: Private address Street: Number: Zip: City: Country: Telephone: Company: Function: Company address Street: Number: Zip: City: Country: Telephone: Fax: VAT nr: Invoice: company I will pay e Date: private by means of employer/employee training cheques Signature: Your address data are incorporated by the IVPV in a database in order to be able to keep you informed of our activities and programmes. In accordance with the law from 8/12/1992 safeguarding personal privacy with respect to the processing of personal data, you are entitled to examine, correct or cancel this information kept by the IVPV. Part I: Communication Networks Module 1: Fixed Networks 1100 Module 2: Multimedia Networks 800 Module 3: Wireless Networks 500 Module 4: etom 200 Modules 1 4 together 2100 Part II: Security Module 1: Security Basics 330 Module 2: Security Applications 1100 Module 3: Advanced Security Configuration 800 Module 4: Organisational Aspects 330 Module 5: Legal Aspects 200 Modules 1 5 together 2200 All modules Part I & II 3900 Reference books Computer networking - A top-down approach featuring the internet, Participation Fee The participation fee includes the tuition fee, course notes, soft drinks, coffee and sandwiches. Payment occurs after reception of the invoice. All invoices are due in thirty days. All fees are exempt of VAT; eventual transfer rates are at the expense of the participant. Reference books are billed directly by the bookshop. Special prices apply for UGent employees and members of Ghent University Association (Consult the website from within the Ghent University/Association network). Group Reduction When participant(s) of a company subscribe for the equivalent of the complete course, a reduction of 20% is given to all additional subscriptions of the same company, even on single modules. Invoicing is then done by one company invoice. For larger numbers of subscriptions, additional reductions could be envisaged: please contact the IVPV-secretariat. Training cheques ( Opleidingscheques BEA ) Ghent University has been recognised as an official training supplier within the framework of the training cheques of the Flemish Community. Thereby you can save on the participation fee of this training ( For employers we refer to (authorisation ID: DV.O ) 4 th edition by James F. Kurose & Keith W. Ross (reference work for Part I, modules 1 and 2): e 50,26 (incl. VAT). Cryptography and Network Security, Principles and Practices, 4 th edition by William Stallings (reference work for Part II, modules 1 and 2): e 65,72 (incl. VAT). Mobile Communications, 2 nd edition by Jochen Schiller (reference work for Part I, module 3): e 63,02 (incl. VAT).

6 practical info Practical Information The programme consists of different modules. Each module can be followed separately. Plenary sessions (theory) are organised as follows: > 18h00-19h30: session 1 > 19h30-20h00: sandwich break > 20h00-21h30: session 2 Location > Plenary sessions (theory): Ghent University, Institute for Continuing Education, Campus Engineering Faculty, Building Magnel (nr. 904), Technologiepark, 9052 Zwijnaarde, Belgium > Lab sessions:, Zuiderpoort Office Park, Gaston Crommenlaan 8, B-9050 Gent-Ledeberg, Belgium Language English is used in all presentations, lab exercises and documentation, so a good knowledge of this language is necessary. Cancellation Policy > Cancellation should be done in writing (either letter or fax); > Cancellation can be done on individual modules or on full subscriptions; > When cancelling up to 10 days before the start of the course/module, an administrative fee of 25% on the requested payback is due; > When cancelling less than 10 days before the start of the module, the full fee is due; Information and Documentation More detailed information about the course in general or on particular modules can be found on the course website: The IVPV secretariat can also be contacted: Institute for Continuing Education Els Van Lierde Technologiepark 913, 9052 Zwijnaarde Tel: , fax: ivpv@ugent.be Scheduling & Participation Fee Part I: Communication Networks Theory Lab* Fee** Module 1: Fixed Networks 10/01/08, 17/01/08, 24/01/08 12/01/08, 19/01/08, /01/08, 02/02/08 Module 2: Multimedia Networks 31/01/08, 13/02/08 16/02/08, 23/02/08, 1/03/ Module 3: Wireless Networks 21/02/08, 28/02/08, 6/03/ Module 4: etom 13/03/ Extra Module: Cases 20/03/08 Included Part II: Security Theory Lab* Fee** Module 1: Security Basics 10/04/08, 17/04/ Module 2: Security Applications 24/04/08, 30/04/08, 8/05/08, 17/05/08, 24/05/ /05/08, 22/05/08 Module 3: Advanced Security Configuration 29/05/08 31/05/08, 7/06/08, /06/08, 21/06/08 Module 4: Organisational Aspects 5/06/08, 12/06/ Module 5: Legal Aspects 19/06/ Extra Module: Cases 26/06/08 Included Part I: all modules together 2100 Part II all modules together 2200 Part I & II, all modules 3900 Scriptics * Extra lab sessions will be organised if necessary This schedule may be subject to modification ** Exempt of VAT. Eventual transfer rates are at the expense of the participant.

ICT Networking and Security

ICT Networking and Security Post-academic course ICT Networking and Security Scientific coordination Prof. dr. ir. Eric Laermans Prof. dr. ir. Ingrid Moerman ir. Andy Van Maele Department of Information Technology, Part I: Communication

More information

ICT & Business. Post-academic course. Scientific coordination. Prof. dr. ir. Jozef De Man Department of Information Technology, Ghent University

ICT & Business. Post-academic course. Scientific coordination. Prof. dr. ir. Jozef De Man Department of Information Technology, Ghent University Post-academic course ICT & Business Scientific coordination Prof. dr. ir. Jozef De Man Department of Information Technology, Ghent University Module 1: Business & ICT alignment 15, 19, 22, 26 and 29 October

More information

ICT Software & Data processing

ICT Software & Data processing Post-academic course ICT Software & Data processing Scientific Coordination Prof. dr. ir. Koen De Bosschere Department of Electronics, Parallel Information Systems Group, Ghent University Prof. dr. ir.

More information

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0 EUCIP - IT Administrator Module 5 IT Security Version 2.0 Module 5 Goals Module 5 Module 5, IT Security, requires the candidate to be familiar with the various ways of protecting data both in a single

More information

IT4405 Computer Networks (Compulsory)

IT4405 Computer Networks (Compulsory) IT4405 Computer Networks (Compulsory) INTRODUCTION This course provides a comprehensive insight into the fundamental concepts in data communications, computer network systems and protocols both fixed and

More information

Bachelor of Information Technology (Network Security)

Bachelor of Information Technology (Network Security) Bachelor of Information Technology (Network Security) Course Structure Year 1: Level 100 Foundation knowledge subjects SEMESTER 1 SEMESTER 2 ITICT101A Fundamentals of Computer Organisation ITICT104A Internetworking

More information

Introduction to Cyber Security / Information Security

Introduction to Cyber Security / Information Security Introduction to Cyber Security / Information Security Syllabus for Introduction to Cyber Security / Information Security program * for students of University of Pune is given below. The program will be

More information

How To Pass A Credit Course At Florida State College At Jacksonville

How To Pass A Credit Course At Florida State College At Jacksonville Form 2A, Page 1 FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE COURSE NUMBER: CTS 2658 COURSE TITLE: PREREQUISITE(S): COREQUISITE(S): Managing Network Security CNT 2210 with grade

More information

ICT Infrastructure & Network Management

ICT Infrastructure & Network Management Context ICT Infrastructure & Network Management Postgraduate Degree Programme Hogeschool-Universiteit Brussel 2014-2015 The HUB University College offers a wide range of postgraduate and other courses

More information

Wireless Mobile Internet Security. 2nd Edition

Wireless Mobile Internet Security. 2nd Edition Brochure More information from http://www.researchandmarkets.com/reports/2330593/ Wireless Mobile Internet Security. 2nd Edition Description: The mobile industry for wireless cellular services has grown

More information

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions

More information

Networking: EC Council Network Security Administrator NSA

Networking: EC Council Network Security Administrator NSA coursemonster.com/uk Networking: EC Council Network Security Administrator NSA View training dates» Overview The EC-Council's NSA certification looks at network security from a defensive view. The NSA

More information

CS 5480 Computer Networks

CS 5480 Computer Networks CS 5480 Computer Networks Professor Sneha Kumar Kasera School of Computing 1 My Background PhD - Computer Science dept, UMass Amherst (1999) Bell Labs research (1999 2003) research interests computer networks

More information

How To Pass The Information And Network Security Certificate

How To Pass The Information And Network Security Certificate Information Technology Information and Network Security Certificate Program Information and Network Security Certificate Program The Information and Network Security Certificate Program helps industry

More information

Computer Network Engineering

Computer Network Engineering 208 Computer Network Engineering Degrees, Certificates and Awards Associate in Science: Certificate of Achievement: Skills Competency Award: Cisco Networking Associate Program Description The field of

More information

Information and Network Security Certificate Program

Information and Network Security Certificate Program Information and Network Security Certificate Program University of California, Irvine, P.O. Box 6050, Irvine, CA 92612-6050 www.extension.uci.edu PROGRAM DESCRIPTION Data security is critical and increasingly

More information

Networking. Systems Design and. Development. CRC Press. Taylor & Francis Croup. Boca Raton London New York. CRC Press is an imprint of the

Networking. Systems Design and. Development. CRC Press. Taylor & Francis Croup. Boca Raton London New York. CRC Press is an imprint of the Networking Systems Design and Development Lee Chao CRC Press Taylor & Francis Croup Boca Raton London New York CRC Press is an imprint of the Taylor & Francis Croup, an Informa business AN AUERBACH BOOK

More information

Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering

Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering Course Number HE20524 Location Meadowbank OVERVIEW OF SUBJECT REQUIREMENTS Note: This document

More information

Computer Network Engineering

Computer Network Engineering 226 Computer Network Engineering Computer Network Engineering Degrees, Certificates and Awards Associate in Science: Computer Network Engineering Certificate of Achievement: Computer Network Engineering

More information

Kommunikationssysteme [KS]

Kommunikationssysteme [KS] Kommunikationssysteme [KS] Dr.-Ing. Falko Dressler Computer Networks and Communication Systems Department of Computer Sciences University of Erlangen-Nürnberg http://www7.informatik.uni-erlangen.de/~dressler/

More information

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶 Network Security 網 路 安 全 Lecture 1 February 20, 2012 洪 國 寶 1 Outline Course information Motivation Introduction to security Basic network concepts Network security models Outline of the course 2 Course

More information

CompTIA Network+ (Exam N10-005)

CompTIA Network+ (Exam N10-005) CompTIA Network+ (Exam N10-005) Length: Location: Language(s): Audience(s): Level: Vendor: Type: Delivery Method: 5 Days 182, Broadway, Newmarket, Auckland English, Entry Level IT Professionals Intermediate

More information

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) Page 1 of 6 Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description: Encompasses

More information

ICTTEN8195B Evaluate and apply network security

ICTTEN8195B Evaluate and apply network security ICTTEN8195B Evaluate and apply network security Release 1 ICTTEN8195B Evaluate and apply network security Modification History Release Release 2 Comments This version first released with ICT10 Integrated

More information

EDA 1200 4.3 Training Programs. Catalog of Course Descriptions

EDA 1200 4.3 Training Programs. Catalog of Course Descriptions EDA 1200 4.3 Training Programs Catalog of Course Descriptions Catalog of Course Descriptions INTRODUCTION...3 ACCESS NETWORKS, AN OVERVIEW...4 CORE NETWORKS, AN OVERVIEW...6 EDA 1200 4.3 INSTALLATION AND

More information

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN) MIS5206 Week 12 Your Name Date 1. Which significant risk is introduced by running the file transfer protocol (FTP) service on a server in a demilitarized zone (DMZ)? a) User from within could send a file

More information

;. ' ;. - ' Computer Networking. ^4 Top-Down Approach. James F. Kurose. Keith W. Ross. Polytechnic University, Brooklyn PEARSON.

;. ' ;. - ' Computer Networking. ^4 Top-Down Approach. James F. Kurose. Keith W. Ross. Polytechnic University, Brooklyn PEARSON. ;. ' ;. - ' Computer Networking ^4 Top-Down Approach James F. Kurose University of Massachusetts, Amherst Keith W. Ross Polytechnic University, Brooklyn PEARSON Addison Weslev Boston San Francisco N e

More information

CMPSCI 453 Computer Networking. Professor V. Arun Department of Computer Science University of Massachusetts Amherst

CMPSCI 453 Computer Networking. Professor V. Arun Department of Computer Science University of Massachusetts Amherst CMPSCI 453 Computer Networking Professor V. Arun Department of Computer Science University of Massachusetts Amherst 1 What is this course about? introductory (first) course in computer networking q learn

More information

Network Security Fundamentals

Network Security Fundamentals APNIC elearning: Network Security Fundamentals 27 November 2013 04:30 pm Brisbane Time (GMT+10) Introduction Presenter Sheryl Hermoso Training Officer sheryl@apnic.net Specialties: Network Security IPv6

More information

APNIC elearning: Network Security Fundamentals. 20 March 2013 10:30 pm Brisbane Time (GMT+10)

APNIC elearning: Network Security Fundamentals. 20 March 2013 10:30 pm Brisbane Time (GMT+10) APNIC elearning: Network Security Fundamentals 20 March 2013 10:30 pm Brisbane Time (GMT+10) Introduction Presenter/s Nurul Islam Roman Senior Training Specialist nurul@apnic.net Specialties: Routing &

More information

NETWORK SECURITY (W/LAB) Course Syllabus

NETWORK SECURITY (W/LAB) Course Syllabus 6111 E. Skelly Drive P. O. Box 477200 Tulsa, OK 74147-7200 NETWORK SECURITY (W/LAB) Course Syllabus Course Number: NTWK-0008 OHLAP Credit: Yes OCAS Code: 8131 Course Length: 130 Hours Career Cluster: Information

More information

ZyXEL offer more than just a product, we offer a solution. The Prestige DSL router family benefits providers and resellers enabling them to offer:

ZyXEL offer more than just a product, we offer a solution. The Prestige DSL router family benefits providers and resellers enabling them to offer: DSL Access Guide DSL Access Routers ZyXEL is a leading manufacturer and supplier of DSL and Voice over IP routers. ZyXEL offer a complete portfolio of routers suited for Telecoms providers, Internet Service

More information

Solutions Guide. Secure Remote Access. Allied Telesis provides comprehensive solutions for secure remote access.

Solutions Guide. Secure Remote Access. Allied Telesis provides comprehensive solutions for secure remote access. Solutions Guide Secure Remote Access Allied Telesis provides comprehensive solutions for secure remote access. Introduction The world is generating electronic data at an astonishing rate, and that data

More information

InCert Network Security Professional Certificate Description for Candidates

InCert Network Security Professional Certificate Description for Candidates TUT / T. Kelo, J. Koskinen / 04.09.2007 InCert The 2nd handbook Version 1.5 InCert Network Security Professional Certificate Description for Candidates Introduction InCert Network Security Professional

More information

Network Security Administrator

Network Security Administrator Network Security Administrator Course ID ECC600 Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze

More information

Internet Security. Contents. ITS335: IT Security. Internet Security. Secure Email. Summary

Internet Security. Contents. ITS335: IT Security. Internet Security. Secure Email. Summary 2 : IT Security Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 2 January 2015 its335y14s2l10, Steve/Courses/2014/s2/its335/lectures/internet.tex, r3506

More information

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or

More information

INFORMATION SCIENCE. INFSCI 0010 INTRODUCTION TO INFORMATION SCIENCE 3 cr. INFSCI 0015 DATA STRUCTURES AND PROGRAMMING TECHNIQUES 3 cr.

INFORMATION SCIENCE. INFSCI 0010 INTRODUCTION TO INFORMATION SCIENCE 3 cr. INFSCI 0015 DATA STRUCTURES AND PROGRAMMING TECHNIQUES 3 cr. INFORMATION SCIENCE INFSCI 0010 INTRODUCTION TO INFORMATION SCIENCE 3 cr. Introduction to the concepts, principles, and skills of information science for students with no programming experience. Topics

More information

CSE 473s Introduction to Computer Networks

CSE 473s Introduction to Computer Networks CSE 473s Introduction to Computer Networks Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@wustl.edu Audio/Video recordings of this lecture are available on-line at: http://www.cse.wustl.edu/~jain/cse473-11/

More information

IT4504 - Data Communication and Networks (Optional)

IT4504 - Data Communication and Networks (Optional) - Data Communication and Networks (Optional) INTRODUCTION This is one of the optional courses designed for Semester 4 of the Bachelor of Information Technology Degree program. This course on Data Communication

More information

Photonix Communications pty. Ltd. Australia. Catalogue

Photonix Communications pty. Ltd. Australia. Catalogue s pty. Ltd. Catalogue 2016 Pty Ltd. Course Content Course Duration (Days) Page No. 01 Understanding IP (Basics) 2 3 02 Understanding IP 3 4 (Advanced) 03 Understanding WLAN (Wi-Fi) 2 5 04 Understanding

More information

How To Use A Cisco Wvvvdns4400N Wireless-N Gigabit Security Router For Small Businesses

How To Use A Cisco Wvvvdns4400N Wireless-N Gigabit Security Router For Small Businesses Cisco WRVS4400N Wireless-N Gigabit Security Router Cisco Small Business Routers Highlights Secure, high-speed wireless network access for small business Gigabit Ethernet connections enable rapid transfer

More information

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes Category Question Name Question Text C 1.1 Do all users and administrators have a unique ID and password? C 1.1.1 Passwords are required to have ( # of ) characters: 5 or less 6-7 8-9 Answer 10 or more

More information

Network Access Security. Lesson 10

Network Access Security. Lesson 10 Network Access Security Lesson 10 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Firewalls Given a scenario, install and configure routers and switches.

More information

SCADA SYSTEMS AND SECURITY WHITEPAPER

SCADA SYSTEMS AND SECURITY WHITEPAPER SCADA SYSTEMS AND SECURITY WHITEPAPER Abstract: This paper discusses some of the options available to companies concerned with the threat of cyber attack on their critical infrastructure, who as part of

More information

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1 Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3

More information

Security + Certification (ITSY 1076) Syllabus

Security + Certification (ITSY 1076) Syllabus Security + Certification (ITSY 1076) Syllabus Course: ITSY 1076 Security+ 40 hours Course Description: This course is targeted toward an Information Technology (IT) professional who has networking and

More information

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security? 7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk

More information

information security and its Describe what drives the need for information security.

information security and its Describe what drives the need for information security. Computer Information Systems (Forensics Classes) Objectives for Course Challenges CIS 200 Intro to Info Security: Includes managerial and Describe information security and its critical role in business.

More information

Eleventh Hour Security+

Eleventh Hour Security+ Eleventh Hour Security+ Exam SYO-201 Study Guide I do Dubrawsky Technical Editor Michael Cross AMSTERDAM BOSTON HEIDELBERG LONDON NEWYORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO SYNGRESS.

More information

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering. Sixth Semester

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering. Sixth Semester Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering Sixth Semester Subject: Network Security & Management Contact Hrs / week: 4 Total hrs: 64 Table of Contents

More information

Review: Lecture 1 - Internet History

Review: Lecture 1 - Internet History Review: Lecture 1 - Internet History late 60's ARPANET, NCP 1977 first internet 1980's The Internet collection of networks communicating using the TCP/IP protocols 1 Review: Lecture 1 - Administration

More information

Implementing Cisco IOS Network Security

Implementing Cisco IOS Network Security Implementing Cisco IOS Network Security IINS v3.0; 5 Days, Instructor-led Course Description Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles

More information

Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1 Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions

More information

U06 IT Infrastructure Policy

U06 IT Infrastructure Policy Dartmoor National Park Authority U06 IT Infrastructure Policy June 2010 This document is copyright to Dartmoor National Park Authority and should not be used or adapted for any purpose without the agreement

More information

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS

More information

Network Security Essentials:

Network Security Essentials: Network Security Essentials: Applications and Standards Fifth Edition William Stallings International Editions contributions by B. R. Chandavarkar National Institute of Technology Karnataka, Surathkal

More information

CSCD 330 Network Programming Winter 2015. Lecture 1 - Course Details

CSCD 330 Network Programming Winter 2015. Lecture 1 - Course Details CSCD 330 Network Programming Winter 2015 Lecture 1 - Course Details Contact Information Instructor: Carol Taylor 319A CEB Phone: 509-359-6065 E-mail: ctaylor4214@comcast.net Course: CSCD330, CEB 204 Lecture,

More information

Cryptography and Network Security

Cryptography and Network Security Cryptography and Network Security Third Edition by William Stallings Lecture slides by Shinu Mathew John http://shinu.info/ Chapter 1 Introduction http://shinu.info/ 2 Background Information Security requirements

More information

CCNA Security 2.0 Scope and Sequence

CCNA Security 2.0 Scope and Sequence CCNA Security 2.0 Scope and Sequence Last Updated August 26, 2015 Target Audience The Cisco CCNA Security course is designed for Cisco Networking Academy students seeking career-oriented, entry-level security

More information

Networking Basics and Network Security

Networking Basics and Network Security Why do we need networks? Networking Basics and Network Security Shared Data and Functions Availability Performance, Load Balancing What is needed for a network? ISO 7-Layer Model Physical Connection Wired:

More information

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings Computer Security Principles and Practice Second Edition William Stailings Lawrie Brown University ofnew South Wales, Australian Defence Force Academy With Contributions by Mick Bauer Security Editor,

More information

ICANWK602A Plan, configure and test advanced server based security

ICANWK602A Plan, configure and test advanced server based security ICANWK602A Plan, configure and test advanced server based security Release: 1 ICANWK602A Plan, configure and test advanced server based security Modification History Release Release 1 Comments This Unit

More information

Description: Objective: Attending students will learn:

Description: Objective: Attending students will learn: Course: Introduction to Cyber Security Duration: 5 Day Hands-On Lab & Lecture Course Price: $ 3,495.00 Description: In 2014 the world has continued to watch as breach after breach results in millions of

More information

Cisco WRVS4400N Wireless-N Gigabit Security Router: Cisco Small Business Routers

Cisco WRVS4400N Wireless-N Gigabit Security Router: Cisco Small Business Routers Cisco WRVS4400N Wireless-N Gigabit Security Router: Cisco Small Business Routers Highlights Secure, high-speed wireless network access for small business Gigabit Ethernet connections enable rapid transfer

More information

Information Security Basic Concepts

Information Security Basic Concepts Information Security Basic Concepts 1 What is security in general Security is about protecting assets from damage or harm Focuses on all types of assets Example: your body, possessions, the environment,

More information

Joseph Migga Kizza. A Guide to Computer Network Security. 4) Springer

Joseph Migga Kizza. A Guide to Computer Network Security. 4) Springer Joseph Migga Kizza A Guide to Computer Network Security 4) Springer Contents Part I Understanding Computer Network Security 1 Computer Network Fundamentals 1.1 Introduction 1.2 Computer Network Models

More information

FBLA Cyber Security aligned with Common Core 6.14. FBLA: Cyber Security RST.9-10.4 RST.11-12.4 RST.9-10.4 RST.11-12.4 WHST.9-10.4 WHST.11-12.

FBLA Cyber Security aligned with Common Core 6.14. FBLA: Cyber Security RST.9-10.4 RST.11-12.4 RST.9-10.4 RST.11-12.4 WHST.9-10.4 WHST.11-12. Competency: Defend and Attack (virus, spam, spyware, Trojans, hijackers, worms) 1. Identify basic security risks and issues to computer hardware, software, and data. 2. Define the various virus types and

More information

Computer Networks CCNA Module 1

Computer Networks CCNA Module 1 Chapter 1: Quiz 1 Q1: Which statement describes a network that supports QoS? The fewest possible devices are affected by a failure. The network should be able to expand to keep up with user demand. The

More information

Developing Network Security Strategies

Developing Network Security Strategies NETE-4635 Computer Network Analysis and Design Developing Network Security Strategies NETE4635 - Computer Network Analysis and Design Slide 1 Network Security Design The 12 Step Program 1. Identify network

More information

ICANWK406A Install, configure and test network security

ICANWK406A Install, configure and test network security ICANWK406A Install, configure and test network security Release: 1 ICANWK406A Install, configure and test network security Modification History Release Release 1 Comments This Unit first released with

More information

Cape Girardeau Career Center CISCO Networking Academy Bill Link, Instructor. 2.,,,, and are key services that ISPs can provide to all customers.

Cape Girardeau Career Center CISCO Networking Academy Bill Link, Instructor. 2.,,,, and are key services that ISPs can provide to all customers. Name: 1. What is an Enterprise network and how does it differ from a WAN? 2.,,,, and are key services that ISPs can provide to all customers. 3. Describe in detail what a managed service that an ISP might

More information

Network Security and Firewall 1

Network Security and Firewall 1 Department/program: Networking Course Code: CPT 224 Contact Hours: 96 Subject/Course WEB Access & Network Security: Theoretical: 2 Hours/week Year Two Semester: Two Prerequisite: NET304 Practical: 4 Hours/week

More information

ICTTEN4215A Install and configure internet protocol TV in a service provider network

ICTTEN4215A Install and configure internet protocol TV in a service provider network ICTTEN4215A Install and configure internet protocol TV in a service provider network Release: 1 ICTTEN4215A Install and configure internet protocol TV in a service provider network Modification History

More information

OCR LEVEL 3 CAMBRIDGE TECHNICAL

OCR LEVEL 3 CAMBRIDGE TECHNICAL Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT COMPUTER NETWORKS R/601/7320 LEVEL 3 UNIT 7 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 COMPUTER NETWORKS R/601/7320 LEVEL

More information

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols

More information

Content Teaching Academy at James Madison University

Content Teaching Academy at James Madison University Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect

More information

VPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu

VPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu VPN Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining

More information

Bellevue University Cybersecurity Programs & Courses

Bellevue University Cybersecurity Programs & Courses Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320

More information

Advanced Higher Computing. Computer Networks. Homework Sheets

Advanced Higher Computing. Computer Networks. Homework Sheets Advanced Higher Computing Computer Networks Homework Sheets Topic : Network Protocols and Standards. Name the organisation responsible for setting international standards and explain why network standards

More information

Course Title: Penetration Testing: Security Analysis

Course Title: Penetration Testing: Security Analysis Course Title: Penetration Testing: Security Analysis Page 1 of 9 Course Description: The Security Analyst Series from EC-Council Press is comprised of five books covering a broad base of topics in advanced

More information

How To Protect Your Network From Attack

How To Protect Your Network From Attack Department of Computer Science Institute for System Architecture, Chair for Computer Networks Internet Services & Protocols Internet (In)Security Dr.-Ing. Stephan Groß Room: INF 3099 E-Mail: stephan.gross@tu-dresden.de

More information

Hands on VoIP. Content. Tel +44 (0) 845 057 0176 enquiries@protelsolutions.co.uk. Introduction

Hands on VoIP. Content. Tel +44 (0) 845 057 0176 enquiries@protelsolutions.co.uk. Introduction Introduction This 4-day course offers a practical introduction to 'hands on' VoIP engineering. Voice over IP promises to reduce your telephony costs and provides unique opportunities for integrating voice

More information

APWG. (n.d.). Unifying the global response to cybecrime. Retrieved from http://www.antiphishing.org/

APWG. (n.d.). Unifying the global response to cybecrime. Retrieved from http://www.antiphishing.org/ DB1 Phishing attacks, usually implemented through HTML enabled e-mails, are becoming more common and more sophisticated. As a network manager, how would you go about protecting your users from a phishing

More information

Secure Use of the New NHS Network (N3): Good Practice Guidelines

Secure Use of the New NHS Network (N3): Good Practice Guidelines Programme NPFIT Document Record ID Key Sub-Prog / Project Information Governance NPFIT-FNT-TO-IG-GPG-0003.01 Prog. Director Mark Ferrar Status Approved Owner Tim Davis Version 1.0 Author Phil Benn Version

More information

Internet Security. Internet Security Voice over IP. Introduction. ETSF10 Internet Protocols 2011-11-22. ETSF10 Internet Protocols 2011

Internet Security. Internet Security Voice over IP. Introduction. ETSF10 Internet Protocols 2011-11-22. ETSF10 Internet Protocols 2011 Internet Security Voice over IP ETSF10 Internet Protocols 2011 Kaan Bür & Jens Andersson Department of Electrical and Information Technology Internet Security IPSec 32.1 SSL/TLS 32.2 Firewalls 32.4 + Voice

More information

Communication Networks MAP-TELE 2012/13

Communication Networks MAP-TELE 2012/13 Communication Networks MAP-TELE 2012/13 Objective of the course The main objective of the course is to present the fundamentals of modern communication systems and networks and allow students to consolidate

More information

SonicWALL PCI 1.1 Implementation Guide

SonicWALL PCI 1.1 Implementation Guide Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard

More information

Technical papers Virtual private networks

Technical papers Virtual private networks Technical papers Virtual private networks This document has now been archived Virtual private networks Contents Introduction What is a VPN? What does the term virtual private network really mean? What

More information

Evaluate the Usability of Security Audits in Electronic Commerce

Evaluate the Usability of Security Audits in Electronic Commerce Evaluate the Usability of Security Audits in Electronic Commerce K.A.D.C.P Kahandawaarachchi, M.C Adipola, D.Y.S Mahagederawatte and P Hewamallikage 3 rd Year Information Systems Undergraduates Sri Lanka

More information

CDA 4504 -- Introduction to Computer Networks

CDA 4504 -- Introduction to Computer Networks CDA 4504 -- Introduction to Computer Networks [Description] [Prereqs] [Textbooks] [Contents] [Slides] [Assignments] [Grading] [Admin Info] [Submission] [Academic Integrity] Course Description and Goals

More information

Prerequisites: Fundamentals of Networking, Knowledge of Operating Systems

Prerequisites: Fundamentals of Networking, Knowledge of Operating Systems Course Name: Linux Server Administration Course Code: PGDNA121 To understand the basic principles underlying Server Software Planning and Deploying Linux Server Manage the Servers Efficiently Fundamentals

More information

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification 1. Module Title Information Security 2. Module Code: CS403INS 3. Module Level - Forth Stage 4. Module Leader Safwan M. 5. Teaching Semester 7 and 8 Soran University Faculty of Science and Engineering Computer

More information

Network Security. Tampere Seminar 23rd October 2008. Overview Switch Security Firewalls Conclusion

Network Security. Tampere Seminar 23rd October 2008. Overview Switch Security Firewalls Conclusion Network Security Tampere Seminar 23rd October 2008 1 Copyright 2008 Hirschmann 2008 Hirschmann Automation and and Control GmbH. Contents Overview Switch Security Firewalls Conclusion 2 Copyright 2008 Hirschmann

More information

Ingate Firewall/SIParator SIP Security for the Enterprise

Ingate Firewall/SIParator SIP Security for the Enterprise Ingate Firewall/SIParator SIP Security for the Enterprise Ingate Systems February, 2013 Ingate Systems AB (publ) Tel: +46 8 600 77 50 BACKGROUND... 1 1 NETWORK SECURITY... 2 2 WHY IS VOIP SECURITY IMPORTANT?...

More information

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding This chapter describes the configuration for the SSL VPN Tunnel Client and for Port Forwarding. When a remote user accesses the SSL VPN

More information

Course Title: Penetration Testing: Communication Media Testing, 1st Edition

Course Title: Penetration Testing: Communication Media Testing, 1st Edition Course Title: Penetration Testing: Communication Media Testing, 1st Edition Page 1 of 6 Course Description: The Security Analyst Series from EC-Council Press is comprised of five books covering a broad

More information

Instructor: Michael J. May. Semester 1 of 5774

Instructor: Michael J. May. Semester 1 of 5774 Syllabus for SE 14-428: Advanced Computer Networks Department of Software Engineering Achi Racov School of Engineering Kinneret College on the Sea of Galilee Instructor: Michael J. May Semester 1 of 5774

More information

The following chart provides the breakdown of exam as to the weight of each section of the exam.

The following chart provides the breakdown of exam as to the weight of each section of the exam. Introduction The CWSP-205 exam, covering the 2015 objectives, will certify that the successful candidate understands the security weaknesses inherent in WLANs, the solutions available to address those

More information