IDS and IPS technology can watch for a wide variety of attacks by examining the traffic as it passes through the network in real-time. In this video, you’ll learn about IDS/IPS technology and the identification technologies that they use.
If you need to identify and stop network, operating system, and application vulnerabilities, then you’ll probably want to consider an IDS or IPS. In this video, you’ll learn about intrusion identification technologies and how they are used to prevent the exploit of vulnerabilities.
The cryptographic hash provides some important validation functions. In this video, you’ll learn the basics of cryptographic hashing and how they can be used to provide confidentiality, authentication, non-repudiation, and integrity.
One of the powerful features of modern cryptography is the ability to digitally “sign” your files and documents. In this video, you’ll learn how non-repudiation can be used to ensure the authenticity and integrity of your documents.
Firewalls are one of the most fundamental security components in our modern networks, but not all firewalls are created equally. In this module, you’ll learn about common features of modern firewalls, such as network-layer and application-layer firewalls, stateful vs. stateless operation, content filtering, signature identification, and zone-based security.