In this course, instructor Lisa Bock describes the various attacks that can occur on the network, along with ways malicious actors use methods such as tunneling and encryption to conceal their behavior. Learn how to recognize the importance of having application visibility and control to effectively monitor the network. Lisa shows you how to examine system data from tcpdump and NetFlow to help with analysis. Discover ways to limit data visibility from threat actors on the network, by using access control lists and network address translation. She then outlines how to assure trust on the network by using the Public Key Infrastructure (PKI). Finally, see how a trusted third party uses certificates to securely exchange session keys to all parties in a transaction. Along the way, Lisa provides practical challenges that let you put your new knowledge to the test.
Learn More- Career Communities
- Identity Resources
- Career Planning
- Access Career Tools
- Build Skills at Denison Edge
- Build Your Resume and Cover Letter
- Search for an Internship or Job
- Network with Confidence
- Leverage Winter Break
- Participate in the Denison Internship Program
- Prepare for an Interview
- Plan for Graduate School
- Research Industries and Companies
- Utilize Financial Resources
- Alumni
- Academic Partnerships
- Meet The Team
- Student Employment