SlideShare a Scribd company logo
1 of 20
Networking & Security
Made By:
Ashish Sharma
NEC
Topics
Networks
Network Devices
Network Security
Internet Security
Application Security
Types Of Networks
•
LAN: Local Area Network
For Small Business
•
MAN: Metropolitan area network
For Cities or Campus
•
WAN: Wide Area Network
Regional or National Networks
Devices Used By Networks
•
Bridges (Old type of Switches)
•
Switches (For LAN basically connect Systems)
•
Routers (For inter- network communication)
Interfaces for these Devices
Console Interface
GUI Interface
Network Certifications
Key Players in Network Certifications:
•
Cisco (CCNA, CCNP)
•
Juniper (JNCIA, JNCIE,JNCIP, JNCIS)
•
Microsoft ( MCSE, MCSA)
Classification Of Cisco Exams
•
Routing and Switching Certification Exams
•
Data Center Certification Exams
•
Return to Top
•
Design Certification Exams
•
Security Certification Exams
•
Storage Networking Certification Exams
•
Voice Certification Exams
•
Wireless Certification Exams
Cisco Exams
•
CCENT Cisco Certified Entry Networking Technician
(ICND1) : Connecting Devices (1Exam)
•
CCNA Cisco Certified Network Associate (ICND1+
ICND2) :Routing and Switching (1Exam)
•
CCNP Cisco Certified Network Professional
To plan, implement, verify and troubleshoot networks
(3Exams)
•
CCIE Cisco Certified Internetwork Expert
More Complex Network (9Exams)
Juniper Exams
•
JNCIA - Juniper Networks Certified Internet
Associate (10 exams)
•
JNCIP - Juniper Networks Certified Internet
Professional (8 exams)
•
JNCIE - Juniper Networks Certified Internet Expert
(6 exams)
•
JNCIS - Juniper Networks Certified Internet
Specialist (13 exams)
Network Operating System
•
A networking operating system (NOS), also
referred to as the Dialoguer, is the software
that runs on a server and enables the server to
manage data, users, groups, security,
applications, and other networking functions.
•
Cisco: Cisco IOS (Internetwork Operating
System) (C/C++)
•
Juniper: JUNOS (C/C++)
Types Of Security
•
Internet Security (In between Client and
Server)
•
Network Security (Inside the Network)
•
Application Security( Application SDLC)
Internet Security
•
Network Layer Security: By Cryptography on TCP/IP including
SSL & TLS.
•
IPsec Protocol: Including Authentication Header &
Encapsulating Security payload.
•
Security Token: Online Sites Providing 6-digit code changing
randomly in 30-60 Sec.
•
Electronic Mail security (Email): Using PGP (Pretty Good
Privacy) for encrypting.
•
Message Authentication Code: Encrypting message by using
Code.
•Firewalls: Screening Network Traffic
Types of Firewalls
•Packet Filters: Processing Data Packet by Packet
•Circuit-Level Gateways: Operates at network level
•Application-Level Gateways: Operates at application level.
•
Malicious Software & Antivirus
•
Malware: User is tricked to download a
software
•
Virus: Code to steal data
•
Trojan Horse: Pretends as secure but
malicious (Keygen)
•
Spyware: Monitor Activites
Application Security
•
Measures taken throughout application life-
cycle to prevent flaws in Security Policies.
Includes
•
Input Validation
•
Authentication
•
Authorization
•
Configuration Mgmt.
•
Exception Management
•
Logging
Network Security
It consists of the provisions and policies adopted
by a network administrator to prevent and
monitor unauthorized access, misuse,
modification, or denial of a computer network.
Key Things:
Policies, Administrator, monitor, network,misuse,
modification
Security Management
•
Firewall
•
Antivirus
•
Wireless: WEP/WPA/WPA2
•
MAC Adress Filtering
•
Assign Static IP Address
•
Password changing on regular basis
•
Awareness program
•
Network Analyzer
Attacks To Be Prevented
•
DoS Attack
•
Spoofing
•
Man in the Middle
•
SQL Injection
Thanks
Any Queries?

More Related Content

What's hot

802.11 Wireless, WEP, WPA lecture
802.11 Wireless, WEP, WPA lecture802.11 Wireless, WEP, WPA lecture
802.11 Wireless, WEP, WPA lectureMartyn Price
 
CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)
CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)
CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)Sam Bowne
 
ICS Performance Lab
ICS Performance LabICS Performance Lab
ICS Performance LabJim Gilsinn
 
Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminarNilesh Sapariya
 
CNIT 123 8: Desktop and Server OS Vulnerabilities
CNIT 123 8: Desktop and Server OS VulnerabilitiesCNIT 123 8: Desktop and Server OS Vulnerabilities
CNIT 123 8: Desktop and Server OS VulnerabilitiesSam Bowne
 
Wireless and how safe are you
Wireless and how safe are youWireless and how safe are you
Wireless and how safe are youMarcus Dempsey
 
802 11 3
802 11 3802 11 3
802 11 3rphelps
 
Network Security: Protecting SOHO Networks
Network Security: Protecting SOHO NetworksNetwork Security: Protecting SOHO Networks
Network Security: Protecting SOHO NetworksJim Gilsinn
 
OpenStack Neutron Advanced Services by Akanda
OpenStack Neutron Advanced Services by AkandaOpenStack Neutron Advanced Services by Akanda
OpenStack Neutron Advanced Services by AkandaSean Roberts
 
Wi fi protected access
Wi fi protected accessWi fi protected access
Wi fi protected accessLopamudra Das
 
Enterprise Network Monitoring Software by ServicePilot
Enterprise Network Monitoring Software by ServicePilotEnterprise Network Monitoring Software by ServicePilot
Enterprise Network Monitoring Software by ServicePilotServicePilot
 
Ch 11: Hacking Wireless Networks
Ch 11: Hacking Wireless NetworksCh 11: Hacking Wireless Networks
Ch 11: Hacking Wireless NetworksSam Bowne
 
Wireless security837
Wireless security837Wireless security837
Wireless security837mark scott
 
Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN securityRajan Kumar
 

What's hot (20)

802.11 Wireless, WEP, WPA lecture
802.11 Wireless, WEP, WPA lecture802.11 Wireless, WEP, WPA lecture
802.11 Wireless, WEP, WPA lecture
 
CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)
CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)
CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)
 
ICS Performance Lab
ICS Performance LabICS Performance Lab
ICS Performance Lab
 
Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminar
 
CNIT 123 8: Desktop and Server OS Vulnerabilities
CNIT 123 8: Desktop and Server OS VulnerabilitiesCNIT 123 8: Desktop and Server OS Vulnerabilities
CNIT 123 8: Desktop and Server OS Vulnerabilities
 
Wireless and how safe are you
Wireless and how safe are youWireless and how safe are you
Wireless and how safe are you
 
802 11 3
802 11 3802 11 3
802 11 3
 
Linux routing and firewall for beginners
Linux   routing and firewall for beginnersLinux   routing and firewall for beginners
Linux routing and firewall for beginners
 
Network Security: Protecting SOHO Networks
Network Security: Protecting SOHO NetworksNetwork Security: Protecting SOHO Networks
Network Security: Protecting SOHO Networks
 
Spec00539
Spec00539Spec00539
Spec00539
 
6421 b Module-09
6421 b Module-096421 b Module-09
6421 b Module-09
 
OpenStack Neutron Advanced Services by Akanda
OpenStack Neutron Advanced Services by AkandaOpenStack Neutron Advanced Services by Akanda
OpenStack Neutron Advanced Services by Akanda
 
Wi fi protected access
Wi fi protected accessWi fi protected access
Wi fi protected access
 
Distributed sensor network
Distributed sensor networkDistributed sensor network
Distributed sensor network
 
Enterprise Network Monitoring Software by ServicePilot
Enterprise Network Monitoring Software by ServicePilotEnterprise Network Monitoring Software by ServicePilot
Enterprise Network Monitoring Software by ServicePilot
 
Ch 11: Hacking Wireless Networks
Ch 11: Hacking Wireless NetworksCh 11: Hacking Wireless Networks
Ch 11: Hacking Wireless Networks
 
Wireless security837
Wireless security837Wireless security837
Wireless security837
 
Wi fi security
Wi fi securityWi fi security
Wi fi security
 
Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN security
 
Wifi security
Wifi securityWifi security
Wifi security
 

Viewers also liked

Menegon et.al._2016_PlosOne
Menegon et.al._2016_PlosOneMenegon et.al._2016_PlosOne
Menegon et.al._2016_PlosOnePuneet Jaju
 
زراعة الشعر باستخدام شعر الجسم
زراعة الشعر باستخدام شعر الجسمزراعة الشعر باستخدام شعر الجسم
زراعة الشعر باستخدام شعر الجسمdr yetkin bayer
 
Xorcom rapid recovery userguide
Xorcom rapid recovery userguideXorcom rapid recovery userguide
Xorcom rapid recovery userguideedkro
 
Pinterest Terms & Contions
Pinterest Terms & ContionsPinterest Terms & Contions
Pinterest Terms & ContionsJayllee Carter
 
Xorcom rapid recovery user guide
Xorcom rapid recovery user guideXorcom rapid recovery user guide
Xorcom rapid recovery user guideedkro
 
كل شي عن عملية زراعة الشعر
كل شي عن عملية زراعة الشعر كل شي عن عملية زراعة الشعر
كل شي عن عملية زراعة الشعر dr yetkin bayer
 
ما هي تقنية ال Fue لزراعة الشعر
ما هي تقنية ال Fue لزراعة الشعرما هي تقنية ال Fue لزراعة الشعر
ما هي تقنية ال Fue لزراعة الشعرdr yetkin bayer
 
بعد زراعة الشعر
بعد زراعة الشعربعد زراعة الشعر
بعد زراعة الشعرdr yetkin bayer
 
تساقط الشعر عند النساء
تساقط الشعر عند النساءتساقط الشعر عند النساء
تساقط الشعر عند النساءdr yetkin bayer
 
Rose and Desmolaize et al 2012_AAC Publication for Puneet Jaju
Rose and Desmolaize et al 2012_AAC  Publication for Puneet JajuRose and Desmolaize et al 2012_AAC  Publication for Puneet Jaju
Rose and Desmolaize et al 2012_AAC Publication for Puneet JajuPuneet Jaju
 
8 حقائق عن زراعة الشعر
8 حقائق عن زراعة الشعر8 حقائق عن زراعة الشعر
8 حقائق عن زراعة الشعرdr yetkin bayer
 
تساقط الشعر و الصلع
تساقط الشعر و الصلعتساقط الشعر و الصلع
تساقط الشعر و الصلعdr yetkin bayer
 

Viewers also liked (14)

Menegon et.al._2016_PlosOne
Menegon et.al._2016_PlosOneMenegon et.al._2016_PlosOne
Menegon et.al._2016_PlosOne
 
زراعة الشعر باستخدام شعر الجسم
زراعة الشعر باستخدام شعر الجسمزراعة الشعر باستخدام شعر الجسم
زراعة الشعر باستخدام شعر الجسم
 
Xorcom rapid recovery userguide
Xorcom rapid recovery userguideXorcom rapid recovery userguide
Xorcom rapid recovery userguide
 
Technology Fundamentals
Technology FundamentalsTechnology Fundamentals
Technology Fundamentals
 
Pinterest Terms & Contions
Pinterest Terms & ContionsPinterest Terms & Contions
Pinterest Terms & Contions
 
Xorcom rapid recovery user guide
Xorcom rapid recovery user guideXorcom rapid recovery user guide
Xorcom rapid recovery user guide
 
كل شي عن عملية زراعة الشعر
كل شي عن عملية زراعة الشعر كل شي عن عملية زراعة الشعر
كل شي عن عملية زراعة الشعر
 
ما هي تقنية ال Fue لزراعة الشعر
ما هي تقنية ال Fue لزراعة الشعرما هي تقنية ال Fue لزراعة الشعر
ما هي تقنية ال Fue لزراعة الشعر
 
بعد زراعة الشعر
بعد زراعة الشعربعد زراعة الشعر
بعد زراعة الشعر
 
تساقط الشعر عند النساء
تساقط الشعر عند النساءتساقط الشعر عند النساء
تساقط الشعر عند النساء
 
Rose and Desmolaize et al 2012_AAC Publication for Puneet Jaju
Rose and Desmolaize et al 2012_AAC  Publication for Puneet JajuRose and Desmolaize et al 2012_AAC  Publication for Puneet Jaju
Rose and Desmolaize et al 2012_AAC Publication for Puneet Jaju
 
8 حقائق عن زراعة الشعر
8 حقائق عن زراعة الشعر8 حقائق عن زراعة الشعر
8 حقائق عن زراعة الشعر
 
Islamic Nice words
Islamic Nice wordsIslamic Nice words
Islamic Nice words
 
تساقط الشعر و الصلع
تساقط الشعر و الصلعتساقط الشعر و الصلع
تساقط الشعر و الصلع
 

Similar to Networking & Security Fundamentals

Secure IOT Gateway
Secure IOT GatewaySecure IOT Gateway
Secure IOT GatewayLF Events
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11Waqas Ahmed Nawaz
 
ITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdfITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdfThangDang53
 
640-554 IT Certification and Career Paths
640-554 IT Certification and Career Paths640-554 IT Certification and Career Paths
640-554 IT Certification and Career Pathshibaehed
 
UCT IoT Deployment and Challenges
UCT IoT Deployment and ChallengesUCT IoT Deployment and Challenges
UCT IoT Deployment and ChallengesThe IOT Academy
 
2018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 72018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 7FRSecure
 
Minimizing Information Transparency
Minimizing Information TransparencyMinimizing Information Transparency
Minimizing Information TransparencyUsman Arshad
 
Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...
Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...
Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...Cisco Enterprise Networks
 
Data center webinar_v2_1
Data center webinar_v2_1Data center webinar_v2_1
Data center webinar_v2_1Lancope, Inc.
 
AWS Security Architecture - Overview
AWS Security Architecture - OverviewAWS Security Architecture - Overview
AWS Security Architecture - OverviewSai Kesavamatham
 
Pass4sure 640-554 Cisco IOS Network Security
Pass4sure 640-554 Cisco IOS Network SecurityPass4sure 640-554 Cisco IOS Network Security
Pass4sure 640-554 Cisco IOS Network SecurityHecrocro
 
Application layer Security in IoT: A Survey
Application layer Security in IoT: A SurveyApplication layer Security in IoT: A Survey
Application layer Security in IoT: A SurveyAdeel Ahmed
 

Similar to Networking & Security Fundamentals (20)

Nguyen Sen
Nguyen SenNguyen Sen
Nguyen Sen
 
Chinmay Padhye
Chinmay PadhyeChinmay Padhye
Chinmay Padhye
 
Secure IOT Gateway
Secure IOT GatewaySecure IOT Gateway
Secure IOT Gateway
 
Computer Fundamentals
Computer FundamentalsComputer Fundamentals
Computer Fundamentals
 
Computer fundamental
Computer fundamentalComputer fundamental
Computer fundamental
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
 
ITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdfITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdf
 
640-554 IT Certification and Career Paths
640-554 IT Certification and Career Paths640-554 IT Certification and Career Paths
640-554 IT Certification and Career Paths
 
UCT IoT Deployment and Challenges
UCT IoT Deployment and ChallengesUCT IoT Deployment and Challenges
UCT IoT Deployment and Challenges
 
CCNA part 1 osi
CCNA part 1 osiCCNA part 1 osi
CCNA part 1 osi
 
Network Security
Network SecurityNetwork Security
Network Security
 
2018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 72018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 7
 
TRUSTSeminar.ppt
TRUSTSeminar.pptTRUSTSeminar.ppt
TRUSTSeminar.ppt
 
Minimizing Information Transparency
Minimizing Information TransparencyMinimizing Information Transparency
Minimizing Information Transparency
 
Chapter08
Chapter08Chapter08
Chapter08
 
Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...
Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...
Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...
 
Data center webinar_v2_1
Data center webinar_v2_1Data center webinar_v2_1
Data center webinar_v2_1
 
AWS Security Architecture - Overview
AWS Security Architecture - OverviewAWS Security Architecture - Overview
AWS Security Architecture - Overview
 
Pass4sure 640-554 Cisco IOS Network Security
Pass4sure 640-554 Cisco IOS Network SecurityPass4sure 640-554 Cisco IOS Network Security
Pass4sure 640-554 Cisco IOS Network Security
 
Application layer Security in IoT: A Survey
Application layer Security in IoT: A SurveyApplication layer Security in IoT: A Survey
Application layer Security in IoT: A Survey
 

Recently uploaded

Webinar - How to set pay ranges in the context of pay transparency legislation
Webinar - How to set pay ranges in the context of pay transparency legislationWebinar - How to set pay ranges in the context of pay transparency legislation
Webinar - How to set pay ranges in the context of pay transparency legislationPayScale, Inc.
 
Mastering Vendor Selection and Partnership Management
Mastering Vendor Selection and Partnership ManagementMastering Vendor Selection and Partnership Management
Mastering Vendor Selection and Partnership ManagementBoundless HQ
 
Austin Recruiter Network Meeting April 25, 2024
Austin Recruiter Network Meeting April 25, 2024Austin Recruiter Network Meeting April 25, 2024
Austin Recruiter Network Meeting April 25, 2024Dan Medlin
 
Kesar Bagh } Escort Service in Lucknow - Phone 🍹 8923113531 🧩 Escorts Service...
Kesar Bagh } Escort Service in Lucknow - Phone 🍹 8923113531 🧩 Escorts Service...Kesar Bagh } Escort Service in Lucknow - Phone 🍹 8923113531 🧩 Escorts Service...
Kesar Bagh } Escort Service in Lucknow - Phone 🍹 8923113531 🧩 Escorts Service...gurkirankumar98700
 
HRM PPT on placement , induction and socialization
HRM PPT on placement , induction and socializationHRM PPT on placement , induction and socialization
HRM PPT on placement , induction and socializationRishik53
 
How Leading Companies Deliver Value with People Analytics
How Leading Companies Deliver Value with People AnalyticsHow Leading Companies Deliver Value with People Analytics
How Leading Companies Deliver Value with People AnalyticsDavid Green
 
Mercer Global Talent Trends 2024 - Human Resources
Mercer Global Talent Trends 2024 - Human ResourcesMercer Global Talent Trends 2024 - Human Resources
Mercer Global Talent Trends 2024 - Human Resourcesmnavarrete3
 
Arjan Call Girl Service #$# O56521286O $#$ Call Girls In Arjan
Arjan Call Girl Service #$# O56521286O $#$ Call Girls In ArjanArjan Call Girl Service #$# O56521286O $#$ Call Girls In Arjan
Arjan Call Girl Service #$# O56521286O $#$ Call Girls In Arjanparisharma5056
 
Cleared Job Fair Handbook | May 2, 2024
Cleared Job Fair Handbook  |  May 2, 2024Cleared Job Fair Handbook  |  May 2, 2024
Cleared Job Fair Handbook | May 2, 2024ClearedJobs.Net
 
VIP Russian Call Girls in Indore Komal 💚😋 9256729539 🚀 Indore Escorts
VIP Russian Call Girls in Indore Komal 💚😋  9256729539 🚀 Indore EscortsVIP Russian Call Girls in Indore Komal 💚😋  9256729539 🚀 Indore Escorts
VIP Russian Call Girls in Indore Komal 💚😋 9256729539 🚀 Indore Escortsaditipandeya
 
Employee Roles & Responsibilities: Driving Organizational Success
Employee Roles & Responsibilities: Driving Organizational SuccessEmployee Roles & Responsibilities: Driving Organizational Success
Employee Roles & Responsibilities: Driving Organizational SuccessHireQuotient
 

Recently uploaded (12)

Webinar - How to set pay ranges in the context of pay transparency legislation
Webinar - How to set pay ranges in the context of pay transparency legislationWebinar - How to set pay ranges in the context of pay transparency legislation
Webinar - How to set pay ranges in the context of pay transparency legislation
 
Mastering Vendor Selection and Partnership Management
Mastering Vendor Selection and Partnership ManagementMastering Vendor Selection and Partnership Management
Mastering Vendor Selection and Partnership Management
 
Austin Recruiter Network Meeting April 25, 2024
Austin Recruiter Network Meeting April 25, 2024Austin Recruiter Network Meeting April 25, 2024
Austin Recruiter Network Meeting April 25, 2024
 
Kesar Bagh } Escort Service in Lucknow - Phone 🍹 8923113531 🧩 Escorts Service...
Kesar Bagh } Escort Service in Lucknow - Phone 🍹 8923113531 🧩 Escorts Service...Kesar Bagh } Escort Service in Lucknow - Phone 🍹 8923113531 🧩 Escorts Service...
Kesar Bagh } Escort Service in Lucknow - Phone 🍹 8923113531 🧩 Escorts Service...
 
HRM PPT on placement , induction and socialization
HRM PPT on placement , induction and socializationHRM PPT on placement , induction and socialization
HRM PPT on placement , induction and socialization
 
How Leading Companies Deliver Value with People Analytics
How Leading Companies Deliver Value with People AnalyticsHow Leading Companies Deliver Value with People Analytics
How Leading Companies Deliver Value with People Analytics
 
Mercer Global Talent Trends 2024 - Human Resources
Mercer Global Talent Trends 2024 - Human ResourcesMercer Global Talent Trends 2024 - Human Resources
Mercer Global Talent Trends 2024 - Human Resources
 
Arjan Call Girl Service #$# O56521286O $#$ Call Girls In Arjan
Arjan Call Girl Service #$# O56521286O $#$ Call Girls In ArjanArjan Call Girl Service #$# O56521286O $#$ Call Girls In Arjan
Arjan Call Girl Service #$# O56521286O $#$ Call Girls In Arjan
 
Cleared Job Fair Handbook | May 2, 2024
Cleared Job Fair Handbook  |  May 2, 2024Cleared Job Fair Handbook  |  May 2, 2024
Cleared Job Fair Handbook | May 2, 2024
 
escort service sasti (*~Call Girls in Rajender Nagar Metro❤️9953056974
escort service sasti (*~Call Girls in Rajender Nagar Metro❤️9953056974escort service sasti (*~Call Girls in Rajender Nagar Metro❤️9953056974
escort service sasti (*~Call Girls in Rajender Nagar Metro❤️9953056974
 
VIP Russian Call Girls in Indore Komal 💚😋 9256729539 🚀 Indore Escorts
VIP Russian Call Girls in Indore Komal 💚😋  9256729539 🚀 Indore EscortsVIP Russian Call Girls in Indore Komal 💚😋  9256729539 🚀 Indore Escorts
VIP Russian Call Girls in Indore Komal 💚😋 9256729539 🚀 Indore Escorts
 
Employee Roles & Responsibilities: Driving Organizational Success
Employee Roles & Responsibilities: Driving Organizational SuccessEmployee Roles & Responsibilities: Driving Organizational Success
Employee Roles & Responsibilities: Driving Organizational Success
 

Networking & Security Fundamentals

  • 1. Networking & Security Made By: Ashish Sharma NEC
  • 3. Types Of Networks • LAN: Local Area Network For Small Business • MAN: Metropolitan area network For Cities or Campus • WAN: Wide Area Network Regional or National Networks
  • 4. Devices Used By Networks • Bridges (Old type of Switches) • Switches (For LAN basically connect Systems) • Routers (For inter- network communication)
  • 5. Interfaces for these Devices Console Interface
  • 7. Network Certifications Key Players in Network Certifications: • Cisco (CCNA, CCNP) • Juniper (JNCIA, JNCIE,JNCIP, JNCIS) • Microsoft ( MCSE, MCSA)
  • 8. Classification Of Cisco Exams • Routing and Switching Certification Exams • Data Center Certification Exams • Return to Top • Design Certification Exams • Security Certification Exams • Storage Networking Certification Exams • Voice Certification Exams • Wireless Certification Exams
  • 9. Cisco Exams • CCENT Cisco Certified Entry Networking Technician (ICND1) : Connecting Devices (1Exam) • CCNA Cisco Certified Network Associate (ICND1+ ICND2) :Routing and Switching (1Exam) • CCNP Cisco Certified Network Professional To plan, implement, verify and troubleshoot networks (3Exams) • CCIE Cisco Certified Internetwork Expert More Complex Network (9Exams)
  • 10. Juniper Exams • JNCIA - Juniper Networks Certified Internet Associate (10 exams) • JNCIP - Juniper Networks Certified Internet Professional (8 exams) • JNCIE - Juniper Networks Certified Internet Expert (6 exams) • JNCIS - Juniper Networks Certified Internet Specialist (13 exams)
  • 11. Network Operating System • A networking operating system (NOS), also referred to as the Dialoguer, is the software that runs on a server and enables the server to manage data, users, groups, security, applications, and other networking functions. • Cisco: Cisco IOS (Internetwork Operating System) (C/C++) • Juniper: JUNOS (C/C++)
  • 12. Types Of Security • Internet Security (In between Client and Server) • Network Security (Inside the Network) • Application Security( Application SDLC)
  • 13. Internet Security • Network Layer Security: By Cryptography on TCP/IP including SSL & TLS. • IPsec Protocol: Including Authentication Header & Encapsulating Security payload. • Security Token: Online Sites Providing 6-digit code changing randomly in 30-60 Sec. • Electronic Mail security (Email): Using PGP (Pretty Good Privacy) for encrypting. • Message Authentication Code: Encrypting message by using Code.
  • 14. •Firewalls: Screening Network Traffic Types of Firewalls •Packet Filters: Processing Data Packet by Packet •Circuit-Level Gateways: Operates at network level •Application-Level Gateways: Operates at application level.
  • 15. • Malicious Software & Antivirus • Malware: User is tricked to download a software • Virus: Code to steal data • Trojan Horse: Pretends as secure but malicious (Keygen) • Spyware: Monitor Activites
  • 16. Application Security • Measures taken throughout application life- cycle to prevent flaws in Security Policies. Includes • Input Validation • Authentication • Authorization • Configuration Mgmt. • Exception Management • Logging
  • 17. Network Security It consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network. Key Things: Policies, Administrator, monitor, network,misuse, modification
  • 18. Security Management • Firewall • Antivirus • Wireless: WEP/WPA/WPA2 • MAC Adress Filtering • Assign Static IP Address • Password changing on regular basis • Awareness program • Network Analyzer
  • 19. Attacks To Be Prevented • DoS Attack • Spoofing • Man in the Middle • SQL Injection