Docente
|
SPOGNARDI ANGELO
(programma)
● Network hardening : This topic covers ways to help the network defend itself from unauthorized access.
● Defense in depth : This topic introduces the idea that defenses must be layered.
● Implementing IDS/IPS : This topic covers intrusion detection and intrusion prevention services. These services audit the network traffic.
● Implementing firewalls and virtual private networks (VPNs) : This topic covers the installation and use of firewalls and virtual private networks.
● Honeypots and honeynets : This topic introduces the idea of providing intentionally vulnerable networks and devices in isolated networks so that they can be watched and analyzed as they are attacked.
● Network monitoring : This topic covers the tools and techniques for monitoring network devices and their associated logs.
● Network traffic analysis : This topic covers the tools and techniques for capturing and analyzing the packets flowing through the network.
● Minimizing exposure (attack surface and vectors) : This topic covers the tools and techniques for finding and mitigating vulnerabilities through looking at potential weaknesses.
● Network access control (internal and external) : This topic covers tools and techniques for limiting the flow of packets based upon rules based on packet content.
● Perimeter networks (also known as demilitarized zones or DMZs) / Proxy Servers : This topic covers tools and techniques for implementing Defense in Depth using isolated networks and special servers.
● Network policy development and enforcement : This topic covers the creation of policies that provide guidance and requirements for the services provided by the network along with the measures to be used to see that the policies are followed.
● Network operational procedures : This topic discusses the creation of procedures that are used to operate the network.
● Network attacks (e.g., session hijacking, man-in-the-middle) : This topic covers the tools and techniques used to test the network by actually attempting to exploit vulnerabilities.
● Introduction to Computer Networks and Cybersecurity, Chwan-Hwa (John) Wu, J. David Irwin, 1ed. CRC Press
|