Course details

Information Security: Securing Networking Protocols

Information Security: Securing Networking Protocols


Overview/Description
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description

Learners can explore the key concept of the common protocols in use, and discover the security issues of the transmission control protocol/Internet protocol (TCP/IP) model and security protocols, in this 10-video course. You will begin by taking a look at the common protocols used in a network, the ports they use, and the type they are and what they do. Next, you will examine some of the security issues of the TCP/IP model at the layer level, of which it has four: application, transport, Internet, and data link. You will also explore the threats, vulnerabilities, and mitigation techniques in network security; identify the types of weak protocols and their replacements; and classify the various types of security protocols. Then learners will continue by examining various ways to use security protocols in different situations; the importance of implementing security protocols. In the final tutorial, learners will explore the security-first mindset and its necessity.



Expected Duration (hours)
0.9

Lesson Objectives

Information Security: Securing Networking Protocols

  • introduce the key concepts of the course
  • list the common protocols used in a network
  • identify some of the security issues of the TCP/IP model at the layer level
  • list the threats, vulnerabilities, and mitigation techniques in a network security
  • identify the types of weak protocols and their replacements
  • classify the various types of security protocols
  • identify the ways to use security protocols in different situations
  • describe the importance of implementing security protocols
  • describe the security-first mindset and its necessity
  • summarize the key concepts covered in this course
  • Course Number:
    it_saseandj_04_enus

    Expertise Level
    Beginner