SlideShare a Scribd company logo
1 of 9
For Job Oriented Short Term Network 
Security Page 
Facebook 9/18/2014
 Network is not about connection between two 
or computer within network but it is 
concerned more on securing it from 
Intruders. 
 And in this live scenario training module we 
will be discussing about the way to secure 
your Network and System along with Hack 
others who are trying to sniff you 
Facebook 9/18/2014
 Wireshark 
 Usurf 
 BackTrack Hacking OS 
 Desktop Security 
 Cooking 
 Hijacking 
 Honeytrap Aircrack and more. 
Facebook 9/18/2014
 Computer Fundamentals 
 Introduction to Computers 
 Types of Computers 
 Introduction to Input Output Devices 
 Introduction to Storage Devices 
 Principals of Data Communication 
Facebook 9/18/2014
 Hardware Configuration 
 Introduction to basic components of a typical 
PC 
 Assembling a PC 
 Installing Operating System, Single, Dual. 
 Basic Trouble shooting during the assembling 
 Basic troubleshooting of PC 
Facebook 9/18/2014
 Introduction to various types of cables and 
connectors used in networking 
 Introduction to networking and networking 
concepts 
 The 7 Layer architecture 
 7 Layer components 
 Repeaters, Hubs, Switches, Bridges, Routers 
Facebook 9/18/2014
 Hubs vs. Switches 
 LAN Standards – Ethernet, Token Ring 
 Structured Cabling 
 LAN Practical 
 IP Addressing and IP Classes 
 TCP/IP Concepts and configuration of IP 
Address 
Facebook 9/18/2014
 Basic network troubleshooting 
 Basics of network security 
 System Security, Network Security 
 Cracking/Hacking 
 Web Security 
 Job Interview Questions 
Facebook 9/18/2014
9/18/2014 
Facebook 
Google+

More Related Content

Viewers also liked

Hair-Pelitos by Sandra Cisneros- Vocabulary
Hair-Pelitos by Sandra Cisneros- VocabularyHair-Pelitos by Sandra Cisneros- Vocabulary
Hair-Pelitos by Sandra Cisneros- Vocabulary
Clemente17
 
determine the extent to which wars in afric are a resultof economic reasons
determine the extent to which wars in afric are a resultof economic reasonsdetermine the extent to which wars in afric are a resultof economic reasons
determine the extent to which wars in afric are a resultof economic reasons
Ross Phiri
 
The Boy who Cried Wolf
The Boy who Cried WolfThe Boy who Cried Wolf
The Boy who Cried Wolf
Clemente17
 

Viewers also liked (14)

ExecuteAndWait Interceptor
ExecuteAndWait InterceptorExecuteAndWait Interceptor
ExecuteAndWait Interceptor
 
Opposites- Exploration Presentation
Opposites- Exploration PresentationOpposites- Exploration Presentation
Opposites- Exploration Presentation
 
Nouns
NounsNouns
Nouns
 
H
HH
H
 
Te doy mil gracias
Te doy mil graciasTe doy mil gracias
Te doy mil gracias
 
Networking overview
Networking overviewNetworking overview
Networking overview
 
Prepositions
PrepositionsPrepositions
Prepositions
 
Execute andwait
Execute andwaitExecute andwait
Execute andwait
 
Hair-Pelitos by Sandra Cisneros- Vocabulary
Hair-Pelitos by Sandra Cisneros- VocabularyHair-Pelitos by Sandra Cisneros- Vocabulary
Hair-Pelitos by Sandra Cisneros- Vocabulary
 
determine the extent to which wars in afric are a resultof economic reasons
determine the extent to which wars in afric are a resultof economic reasonsdetermine the extent to which wars in afric are a resultof economic reasons
determine the extent to which wars in afric are a resultof economic reasons
 
Project
ProjectProject
Project
 
Peluang Usaha Yoghurt
Peluang Usaha YoghurtPeluang Usaha Yoghurt
Peluang Usaha Yoghurt
 
The Boy who Cried Wolf
The Boy who Cried WolfThe Boy who Cried Wolf
The Boy who Cried Wolf
 
Things to do in Hawaii
Things to do in HawaiiThings to do in Hawaii
Things to do in Hawaii
 

Similar to Networking overview part.2

Understanding your Home network and keeping it secure
Understanding your Home network and keeping it secureUnderstanding your Home network and keeping it secure
Understanding your Home network and keeping it secure
clcewing
 
ComputerNetworksAssignment
ComputerNetworksAssignmentComputerNetworksAssignment
ComputerNetworksAssignment
Rebecca Patient
 
NETWORKING SYSTEMS .docx
NETWORKING SYSTEMS                                                .docxNETWORKING SYSTEMS                                                .docx
NETWORKING SYSTEMS .docx
dohertyjoetta
 
Global Transition Of Internet Protocol
Global Transition Of Internet ProtocolGlobal Transition Of Internet Protocol
Global Transition Of Internet Protocol
Miles Priar
 

Similar to Networking overview part.2 (20)

chapter-1-business-data-networks-and-security-10-th-edition.pptx
chapter-1-business-data-networks-and-security-10-th-edition.pptxchapter-1-business-data-networks-and-security-10-th-edition.pptx
chapter-1-business-data-networks-and-security-10-th-edition.pptx
 
Kumar cscl final
Kumar cscl finalKumar cscl final
Kumar cscl final
 
Assignment 1
Assignment 1  Assignment 1
Assignment 1
 
Wireshark - Basics
Wireshark - BasicsWireshark - Basics
Wireshark - Basics
 
Nad710 Introduction To Networks Using Linux
Nad710   Introduction To Networks Using LinuxNad710   Introduction To Networks Using Linux
Nad710 Introduction To Networks Using Linux
 
Lesson 1 slideshow
Lesson 1 slideshowLesson 1 slideshow
Lesson 1 slideshow
 
G04734450
G04734450G04734450
G04734450
 
smoothwall networkguide
smoothwall networkguidesmoothwall networkguide
smoothwall networkguide
 
Major project report
Major project reportMajor project report
Major project report
 
Muo network-manual
Muo network-manualMuo network-manual
Muo network-manual
 
Muo Network Manual
Muo Network ManualMuo Network Manual
Muo Network Manual
 
Firewire documentation final
Firewire documentation finalFirewire documentation final
Firewire documentation final
 
Understanding your Home network and keeping it secure
Understanding your Home network and keeping it secureUnderstanding your Home network and keeping it secure
Understanding your Home network and keeping it secure
 
COC2_edited.docx
COC2_edited.docxCOC2_edited.docx
COC2_edited.docx
 
ComputerNetworksAssignment
ComputerNetworksAssignmentComputerNetworksAssignment
ComputerNetworksAssignment
 
Routers and Routing Basic Module 1
Routers and Routing Basic Module 1Routers and Routing Basic Module 1
Routers and Routing Basic Module 1
 
2 1 lan
2 1 lan2 1 lan
2 1 lan
 
NETWORKING SYSTEMS .docx
NETWORKING SYSTEMS                                                .docxNETWORKING SYSTEMS                                                .docx
NETWORKING SYSTEMS .docx
 
Global Transition Of Internet Protocol
Global Transition Of Internet ProtocolGlobal Transition Of Internet Protocol
Global Transition Of Internet Protocol
 
DISTRIBUTED NETWORKING - By Hansa Edirisinghe
DISTRIBUTED NETWORKING - By Hansa EdirisingheDISTRIBUTED NETWORKING - By Hansa Edirisinghe
DISTRIBUTED NETWORKING - By Hansa Edirisinghe
 

Recently uploaded

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

Networking overview part.2

  • 1. For Job Oriented Short Term Network Security Page Facebook 9/18/2014
  • 2.  Network is not about connection between two or computer within network but it is concerned more on securing it from Intruders.  And in this live scenario training module we will be discussing about the way to secure your Network and System along with Hack others who are trying to sniff you Facebook 9/18/2014
  • 3.  Wireshark  Usurf  BackTrack Hacking OS  Desktop Security  Cooking  Hijacking  Honeytrap Aircrack and more. Facebook 9/18/2014
  • 4.  Computer Fundamentals  Introduction to Computers  Types of Computers  Introduction to Input Output Devices  Introduction to Storage Devices  Principals of Data Communication Facebook 9/18/2014
  • 5.  Hardware Configuration  Introduction to basic components of a typical PC  Assembling a PC  Installing Operating System, Single, Dual.  Basic Trouble shooting during the assembling  Basic troubleshooting of PC Facebook 9/18/2014
  • 6.  Introduction to various types of cables and connectors used in networking  Introduction to networking and networking concepts  The 7 Layer architecture  7 Layer components  Repeaters, Hubs, Switches, Bridges, Routers Facebook 9/18/2014
  • 7.  Hubs vs. Switches  LAN Standards – Ethernet, Token Ring  Structured Cabling  LAN Practical  IP Addressing and IP Classes  TCP/IP Concepts and configuration of IP Address Facebook 9/18/2014
  • 8.  Basic network troubleshooting  Basics of network security  System Security, Network Security  Cracking/Hacking  Web Security  Job Interview Questions Facebook 9/18/2014

Editor's Notes

  1. http://www.apextgi.in