Access over 20 million homework & study documents

Network Security

Content type
User Generated
Subject
Networking
School
Beauty Academy of South Florida
Type
Homework
Rating
Showing Page:
1/10
Running head: NETWORK SECURITY 1
Network security
Name
Institution
Date

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/10
NETWORK SECURITY 2
Table of Contents
Introduction ................................................................................................................................................... 3
Network Security importance ....................................................................................................................... 3
Network security certifications ..................................................................................................................... 4
CISSP .......................................................................................................................................................... 4
CompTIA's Network+ ................................................................................................................................ 4
Cisco Certified Network Associate (CCNA)................................................................................................ 5
Certified Ethical Hacker Certification ....................................................................................................... 5
Network security methods ............................................................................................................................ 5
Access control ........................................................................................................................................... 6
Anti-malware: ........................................................................................................................................... 6
Application security: ................................................................................................................................. 6
Behavioral analytics: ................................................................................................................................. 6
Prevention of data loss ............................................................................................................................. 6
Firewalls: ................................................................................................................................................... 7
Intrusion detection and prevention systems. ........................................................................................... 7
Network security software ............................................................................................................................ 8
Packet sniffers: .......................................................................................................................................... 8
Vulnerability scanners such as Nessus ...................................................................................................... 9
The software of intrusion detection and prevention ............................................................................... 9
Conclusion .................................................................................................................................................... 9
References .................................................................................................................................................. 10

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/10

Sign up to view the full document!

lock_open Sign Up
End of Preview - Want to read all 10 pages?
Access Now
Unformatted Attachment Preview
Running head: NETWORK SECURITY 1 Network security Name Institution Date NETWORK SECURITY 2 Table of Contents Introduction ................................................................................................................................................... 3 Network Security importance ....................................................................................................................... 3 Network security certifications ..................................................................................................................... 4 CISSP.......................................................................................................................................................... 4 CompTIA's Network+ ................................................................................................................................ 4 Cisco Certified Network Associate (CCNA)................................................................................................ 5 Certified Ethical Hacker Certification ....................................................................................................... 5 Network security methods ............................................................................................................................ 5 Access control ........................................................................................................................................... 6 Anti-malware: . ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Anonymous
Goes above and beyond expectations!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4