What is this subject about?
We will teach you how to:
a) Select the standard tools to identify denial of service attack.
b) Discuss different types of virus, malware and spyware.
c) Build a network secured from malware and spyware.
d) Select software tools to secure a network from malware and spyware.
You will be able to gain advanced knowledge of methodologies used by hackers and apply tools and techniques to protect computer networks from hackers.
We will teach you how to:
a) Select hacking tools to protect networked computers.
b) Analyse different cryptography methods that can be used to prevent attacks and protect the network and analyse basic methodologies used by hackers.
c) Select appropriate cryptographic methodology to secure the network.
You will be able to apply computer security technology to build a secure network.
We will teach you how to:
a) Select an appropriate firewall for the computer network.
b) Test the functions of software scanners.
c) Identify intrusion detection systems to solve the security issues in computer networks.
You will be able to create security policies for users and administrators of computer networks.
We will teach you how to:
a) Discuss the importance of security policies for users.
b) Create security policies for networked users.
c) Analyse and improve existing security policies to meet common industry standards.
You will be able to use vulnerability scanning tools and implement security in networks.
We will teach you how to:
a) Select vulnerability scanning tools to detect and resolve security problems.
b) Evaluate security concerns in computer networks.
c) Detect the hacker’s presence and footprint on the network.