SlideShare a Scribd company logo
Networking & Security
Made By:
Ashish Sharma
NEC
Topics
Networks
Network Devices
Network Security
Internet Security
Application Security
Types Of Networks
•
LAN: Local Area Network
For Small Business
•
MAN: Metropolitan area network
For Cities or Campus
•
WAN: Wide Area Network
Regional or National Networks
Devices Used By Networks
•
Bridges (Old type of Switches)
•
Switches (For LAN basically connect Systems)
•
Routers (For inter- network communication)
Interfaces for these Devices
Console Interface
GUI Interface
Network Certifications
Key Players in Network Certifications:
•
Cisco (CCNA, CCNP)
•
Juniper (JNCIA, JNCIE,JNCIP, JNCIS)
•
Microsoft ( MCSE, MCSA)
Classification Of Cisco Exams
•
Routing and Switching Certification Exams
•
Data Center Certification Exams
•
Return to Top
•
Design Certification Exams
•
Security Certification Exams
•
Storage Networking Certification Exams
•
Voice Certification Exams
•
Wireless Certification Exams
Cisco Exams
•
CCENT Cisco Certified Entry Networking Technician
(ICND1) : Connecting Devices (1Exam)
•
CCNA Cisco Certified Network Associate (ICND1+
ICND2) :Routing and Switching (1Exam)
•
CCNP Cisco Certified Network Professional
To plan, implement, verify and troubleshoot networks
(3Exams)
•
CCIE Cisco Certified Internetwork Expert
More Complex Network (9Exams)
Juniper Exams
•
JNCIA - Juniper Networks Certified Internet
Associate (10 exams)
•
JNCIP - Juniper Networks Certified Internet
Professional (8 exams)
•
JNCIE - Juniper Networks Certified Internet Expert
(6 exams)
•
JNCIS - Juniper Networks Certified Internet
Specialist (13 exams)
Network Operating System
•
A networking operating system (NOS), also
referred to as the Dialoguer, is the software
that runs on a server and enables the server to
manage data, users, groups, security,
applications, and other networking functions.
•
Cisco: Cisco IOS (Internetwork Operating
System) (C/C++)
•
Juniper: JUNOS (C/C++)
Types Of Security
•
Internet Security (In between Client and
Server)
•
Network Security (Inside the Network)
•
Application Security( Application SDLC)
Internet Security
•
Network Layer Security: By Cryptography on TCP/IP including
SSL & TLS.
•
IPsec Protocol: Including Authentication Header &
Encapsulating Security payload.
•
Security Token: Online Sites Providing 6-digit code changing
randomly in 30-60 Sec.
•
Electronic Mail security (Email): Using PGP (Pretty Good
Privacy) for encrypting.
•
Message Authentication Code: Encrypting message by using
Code.
•Firewalls: Screening Network Traffic
Types of Firewalls
•Packet Filters: Processing Data Packet by Packet
•Circuit-Level Gateways: Operates at network level
•Application-Level Gateways: Operates at application level.
•
Malicious Software & Antivirus
•
Malware: User is tricked to download a
software
•
Virus: Code to steal data
•
Trojan Horse: Pretends as secure but
malicious (Keygen)
•
Spyware: Monitor Activites
Application Security
•
Measures taken throughout application life-
cycle to prevent flaws in Security Policies.
Includes
•
Input Validation
•
Authentication
•
Authorization
•
Configuration Mgmt.
•
Exception Management
•
Logging
Network Security
It consists of the provisions and policies adopted
by a network administrator to prevent and
monitor unauthorized access, misuse,
modification, or denial of a computer network.
Key Things:
Policies, Administrator, monitor, network,misuse,
modification
Security Management
•
Firewall
•
Antivirus
•
Wireless: WEP/WPA/WPA2
•
MAC Adress Filtering
•
Assign Static IP Address
•
Password changing on regular basis
•
Awareness program
•
Network Analyzer
Attacks To Be Prevented
•
DoS Attack
•
Spoofing
•
Man in the Middle
•
SQL Injection
Thanks
Any Queries?

More Related Content

What's hot

802.11 Wireless, WEP, WPA lecture
802.11 Wireless, WEP, WPA lecture802.11 Wireless, WEP, WPA lecture
802.11 Wireless, WEP, WPA lecture
Martyn Price
 
CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)
CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)
CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)
Sam Bowne
 
ICS Performance Lab
ICS Performance LabICS Performance Lab
ICS Performance Lab
Jim Gilsinn
 
Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminar
Nilesh Sapariya
 
CNIT 123 8: Desktop and Server OS Vulnerabilities
CNIT 123 8: Desktop and Server OS VulnerabilitiesCNIT 123 8: Desktop and Server OS Vulnerabilities
CNIT 123 8: Desktop and Server OS Vulnerabilities
Sam Bowne
 
Wireless and how safe are you
Wireless and how safe are youWireless and how safe are you
Wireless and how safe are you
Marcus Dempsey
 
802 11 3
802 11 3802 11 3
802 11 3
rphelps
 
Linux routing and firewall for beginners
Linux   routing and firewall for beginnersLinux   routing and firewall for beginners
Linux routing and firewall for beginners
n|u - The Open Security Community
 
Network Security: Protecting SOHO Networks
Network Security: Protecting SOHO NetworksNetwork Security: Protecting SOHO Networks
Network Security: Protecting SOHO Networks
Jim Gilsinn
 
Spec00539
Spec00539Spec00539
Spec00539
guest2f67152
 
6421 b Module-09
6421 b Module-096421 b Module-09
6421 b Module-09
Bibekananada Jena
 
OpenStack Neutron Advanced Services by Akanda
OpenStack Neutron Advanced Services by AkandaOpenStack Neutron Advanced Services by Akanda
OpenStack Neutron Advanced Services by Akanda
Sean Roberts
 
Wi fi protected access
Wi fi protected accessWi fi protected access
Wi fi protected access
Lopamudra Das
 
Distributed sensor network
Distributed sensor networkDistributed sensor network
Distributed sensor network
Madhumithah Ilango
 
Enterprise Network Monitoring Software by ServicePilot
Enterprise Network Monitoring Software by ServicePilotEnterprise Network Monitoring Software by ServicePilot
Enterprise Network Monitoring Software by ServicePilot
ServicePilot
 
Ch 11: Hacking Wireless Networks
Ch 11: Hacking Wireless NetworksCh 11: Hacking Wireless Networks
Ch 11: Hacking Wireless Networks
Sam Bowne
 
Wireless security837
Wireless security837Wireless security837
Wireless security837
mark scott
 
Wi fi security
Wi fi securityWi fi security
Wi fi security
Virendra Thakur
 
Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN security
Rajan Kumar
 
Wifi security
Wifi securityWifi security
Wifi security
Dooremoore
 

What's hot (20)

802.11 Wireless, WEP, WPA lecture
802.11 Wireless, WEP, WPA lecture802.11 Wireless, WEP, WPA lecture
802.11 Wireless, WEP, WPA lecture
 
CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)
CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)
CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)
 
ICS Performance Lab
ICS Performance LabICS Performance Lab
ICS Performance Lab
 
Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminar
 
CNIT 123 8: Desktop and Server OS Vulnerabilities
CNIT 123 8: Desktop and Server OS VulnerabilitiesCNIT 123 8: Desktop and Server OS Vulnerabilities
CNIT 123 8: Desktop and Server OS Vulnerabilities
 
Wireless and how safe are you
Wireless and how safe are youWireless and how safe are you
Wireless and how safe are you
 
802 11 3
802 11 3802 11 3
802 11 3
 
Linux routing and firewall for beginners
Linux   routing and firewall for beginnersLinux   routing and firewall for beginners
Linux routing and firewall for beginners
 
Network Security: Protecting SOHO Networks
Network Security: Protecting SOHO NetworksNetwork Security: Protecting SOHO Networks
Network Security: Protecting SOHO Networks
 
Spec00539
Spec00539Spec00539
Spec00539
 
6421 b Module-09
6421 b Module-096421 b Module-09
6421 b Module-09
 
OpenStack Neutron Advanced Services by Akanda
OpenStack Neutron Advanced Services by AkandaOpenStack Neutron Advanced Services by Akanda
OpenStack Neutron Advanced Services by Akanda
 
Wi fi protected access
Wi fi protected accessWi fi protected access
Wi fi protected access
 
Distributed sensor network
Distributed sensor networkDistributed sensor network
Distributed sensor network
 
Enterprise Network Monitoring Software by ServicePilot
Enterprise Network Monitoring Software by ServicePilotEnterprise Network Monitoring Software by ServicePilot
Enterprise Network Monitoring Software by ServicePilot
 
Ch 11: Hacking Wireless Networks
Ch 11: Hacking Wireless NetworksCh 11: Hacking Wireless Networks
Ch 11: Hacking Wireless Networks
 
Wireless security837
Wireless security837Wireless security837
Wireless security837
 
Wi fi security
Wi fi securityWi fi security
Wi fi security
 
Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN security
 
Wifi security
Wifi securityWifi security
Wifi security
 

Viewers also liked

Menegon et.al._2016_PlosOne
Menegon et.al._2016_PlosOneMenegon et.al._2016_PlosOne
Menegon et.al._2016_PlosOne
Puneet Jaju
 
زراعة الشعر باستخدام شعر الجسم
زراعة الشعر باستخدام شعر الجسمزراعة الشعر باستخدام شعر الجسم
زراعة الشعر باستخدام شعر الجسم
dr yetkin bayer
 
Xorcom rapid recovery userguide
Xorcom rapid recovery userguideXorcom rapid recovery userguide
Xorcom rapid recovery userguide
edkro
 
Technology Fundamentals
Technology FundamentalsTechnology Fundamentals
Technology Fundamentals
ashishsharma1506
 
Pinterest Terms & Contions
Pinterest Terms & ContionsPinterest Terms & Contions
Pinterest Terms & Contions
Jayllee Carter
 
Xorcom rapid recovery user guide
Xorcom rapid recovery user guideXorcom rapid recovery user guide
Xorcom rapid recovery user guide
edkro
 
كل شي عن عملية زراعة الشعر
كل شي عن عملية زراعة الشعر كل شي عن عملية زراعة الشعر
كل شي عن عملية زراعة الشعر
dr yetkin bayer
 
ما هي تقنية ال Fue لزراعة الشعر
ما هي تقنية ال Fue لزراعة الشعرما هي تقنية ال Fue لزراعة الشعر
ما هي تقنية ال Fue لزراعة الشعر
dr yetkin bayer
 
بعد زراعة الشعر
بعد زراعة الشعربعد زراعة الشعر
بعد زراعة الشعر
dr yetkin bayer
 
تساقط الشعر عند النساء
تساقط الشعر عند النساءتساقط الشعر عند النساء
تساقط الشعر عند النساء
dr yetkin bayer
 
Rose and Desmolaize et al 2012_AAC Publication for Puneet Jaju
Rose and Desmolaize et al 2012_AAC  Publication for Puneet JajuRose and Desmolaize et al 2012_AAC  Publication for Puneet Jaju
Rose and Desmolaize et al 2012_AAC Publication for Puneet Jaju
Puneet Jaju
 
8 حقائق عن زراعة الشعر
8 حقائق عن زراعة الشعر8 حقائق عن زراعة الشعر
8 حقائق عن زراعة الشعر
dr yetkin bayer
 
Islamic Nice words
Islamic Nice wordsIslamic Nice words
Islamic Nice words
Rashidi Asari
 
تساقط الشعر و الصلع
تساقط الشعر و الصلعتساقط الشعر و الصلع
تساقط الشعر و الصلع
dr yetkin bayer
 

Viewers also liked (14)

Menegon et.al._2016_PlosOne
Menegon et.al._2016_PlosOneMenegon et.al._2016_PlosOne
Menegon et.al._2016_PlosOne
 
زراعة الشعر باستخدام شعر الجسم
زراعة الشعر باستخدام شعر الجسمزراعة الشعر باستخدام شعر الجسم
زراعة الشعر باستخدام شعر الجسم
 
Xorcom rapid recovery userguide
Xorcom rapid recovery userguideXorcom rapid recovery userguide
Xorcom rapid recovery userguide
 
Technology Fundamentals
Technology FundamentalsTechnology Fundamentals
Technology Fundamentals
 
Pinterest Terms & Contions
Pinterest Terms & ContionsPinterest Terms & Contions
Pinterest Terms & Contions
 
Xorcom rapid recovery user guide
Xorcom rapid recovery user guideXorcom rapid recovery user guide
Xorcom rapid recovery user guide
 
كل شي عن عملية زراعة الشعر
كل شي عن عملية زراعة الشعر كل شي عن عملية زراعة الشعر
كل شي عن عملية زراعة الشعر
 
ما هي تقنية ال Fue لزراعة الشعر
ما هي تقنية ال Fue لزراعة الشعرما هي تقنية ال Fue لزراعة الشعر
ما هي تقنية ال Fue لزراعة الشعر
 
بعد زراعة الشعر
بعد زراعة الشعربعد زراعة الشعر
بعد زراعة الشعر
 
تساقط الشعر عند النساء
تساقط الشعر عند النساءتساقط الشعر عند النساء
تساقط الشعر عند النساء
 
Rose and Desmolaize et al 2012_AAC Publication for Puneet Jaju
Rose and Desmolaize et al 2012_AAC  Publication for Puneet JajuRose and Desmolaize et al 2012_AAC  Publication for Puneet Jaju
Rose and Desmolaize et al 2012_AAC Publication for Puneet Jaju
 
8 حقائق عن زراعة الشعر
8 حقائق عن زراعة الشعر8 حقائق عن زراعة الشعر
8 حقائق عن زراعة الشعر
 
Islamic Nice words
Islamic Nice wordsIslamic Nice words
Islamic Nice words
 
تساقط الشعر و الصلع
تساقط الشعر و الصلعتساقط الشعر و الصلع
تساقط الشعر و الصلع
 

Similar to Networking & Security Fundamentals

Nguyen Sen
Nguyen SenNguyen Sen
Nguyen Sen
Nguyen Sen
 
Chinmay Padhye
Chinmay PadhyeChinmay Padhye
Chinmay Padhye
chinmaypadhye1985
 
Secure IOT Gateway
Secure IOT GatewaySecure IOT Gateway
Secure IOT Gateway
LF Events
 
Computer Fundamentals
Computer FundamentalsComputer Fundamentals
Computer Fundamentals
ashishsharma1506
 
Computer fundamental
Computer fundamentalComputer fundamental
Computer fundamental
ashishsharma1506
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
Waqas Ahmed Nawaz
 
ITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdfITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdf
ThangDang53
 
640-554 IT Certification and Career Paths
640-554 IT Certification and Career Paths640-554 IT Certification and Career Paths
640-554 IT Certification and Career Paths
hibaehed
 
UCT IoT Deployment and Challenges
UCT IoT Deployment and ChallengesUCT IoT Deployment and Challenges
UCT IoT Deployment and Challenges
The IOT Academy
 
CCNA part 1 osi
CCNA part 1 osiCCNA part 1 osi
Network Security
Network SecurityNetwork Security
2018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 72018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 7
FRSecure
 
TRUSTSeminar.ppt
TRUSTSeminar.pptTRUSTSeminar.ppt
TRUSTSeminar.ppt
ssuserfb92ae
 
Minimizing Information Transparency
Minimizing Information TransparencyMinimizing Information Transparency
Minimizing Information Transparency
Usman Arshad
 
Chapter08
Chapter08Chapter08
Chapter08
Muhammad Ahad
 
Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...
Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...
Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...
Cisco Enterprise Networks
 
Data center webinar_v2_1
Data center webinar_v2_1Data center webinar_v2_1
Data center webinar_v2_1
Lancope, Inc.
 
AWS Security Architecture - Overview
AWS Security Architecture - OverviewAWS Security Architecture - Overview
AWS Security Architecture - Overview
Sai Kesavamatham
 
Pass4sure 640-554 Cisco IOS Network Security
Pass4sure 640-554 Cisco IOS Network SecurityPass4sure 640-554 Cisco IOS Network Security
Pass4sure 640-554 Cisco IOS Network Security
Hecrocro
 
Application layer Security in IoT: A Survey
Application layer Security in IoT: A SurveyApplication layer Security in IoT: A Survey
Application layer Security in IoT: A Survey
Adeel Ahmed
 

Similar to Networking & Security Fundamentals (20)

Nguyen Sen
Nguyen SenNguyen Sen
Nguyen Sen
 
Chinmay Padhye
Chinmay PadhyeChinmay Padhye
Chinmay Padhye
 
Secure IOT Gateway
Secure IOT GatewaySecure IOT Gateway
Secure IOT Gateway
 
Computer Fundamentals
Computer FundamentalsComputer Fundamentals
Computer Fundamentals
 
Computer fundamental
Computer fundamentalComputer fundamental
Computer fundamental
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
 
ITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdfITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdf
 
640-554 IT Certification and Career Paths
640-554 IT Certification and Career Paths640-554 IT Certification and Career Paths
640-554 IT Certification and Career Paths
 
UCT IoT Deployment and Challenges
UCT IoT Deployment and ChallengesUCT IoT Deployment and Challenges
UCT IoT Deployment and Challenges
 
CCNA part 1 osi
CCNA part 1 osiCCNA part 1 osi
CCNA part 1 osi
 
Network Security
Network SecurityNetwork Security
Network Security
 
2018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 72018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 7
 
TRUSTSeminar.ppt
TRUSTSeminar.pptTRUSTSeminar.ppt
TRUSTSeminar.ppt
 
Minimizing Information Transparency
Minimizing Information TransparencyMinimizing Information Transparency
Minimizing Information Transparency
 
Chapter08
Chapter08Chapter08
Chapter08
 
Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...
Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...
Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...
 
Data center webinar_v2_1
Data center webinar_v2_1Data center webinar_v2_1
Data center webinar_v2_1
 
AWS Security Architecture - Overview
AWS Security Architecture - OverviewAWS Security Architecture - Overview
AWS Security Architecture - Overview
 
Pass4sure 640-554 Cisco IOS Network Security
Pass4sure 640-554 Cisco IOS Network SecurityPass4sure 640-554 Cisco IOS Network Security
Pass4sure 640-554 Cisco IOS Network Security
 
Application layer Security in IoT: A Survey
Application layer Security in IoT: A SurveyApplication layer Security in IoT: A Survey
Application layer Security in IoT: A Survey
 

Recently uploaded

Rally Webinar Recruitment Marketing for High Volume Hiring.pdf
Rally Webinar Recruitment Marketing for High Volume Hiring.pdfRally Webinar Recruitment Marketing for High Volume Hiring.pdf
Rally Webinar Recruitment Marketing for High Volume Hiring.pdf
Rally Recruitment Marketing
 
一模一样(unh毕业证书)美国新罕布什尔大学毕业证学位证书案例原版一模一样
一模一样(unh毕业证书)美国新罕布什尔大学毕业证学位证书案例原版一模一样一模一样(unh毕业证书)美国新罕布什尔大学毕业证学位证书案例原版一模一样
一模一样(unh毕业证书)美国新罕布什尔大学毕业证学位证书案例原版一模一样
6budtn3l
 
Your Guide To Finding The Perfect Part-Time Job
Your Guide To Finding The Perfect Part-Time JobYour Guide To Finding The Perfect Part-Time Job
Your Guide To Finding The Perfect Part-Time Job
SnapJob
 
Becoming Relentlessly Human-Centred in an AI World - Erin Patchell - SocialHR...
Becoming Relentlessly Human-Centred in an AI World - Erin Patchell - SocialHR...Becoming Relentlessly Human-Centred in an AI World - Erin Patchell - SocialHR...
Becoming Relentlessly Human-Centred in an AI World - Erin Patchell - SocialHR...
SocialHRCamp
 
哪里购买伯明翰大学毕业证(uob毕业证)学位证书原版一模一样
哪里购买伯明翰大学毕业证(uob毕业证)学位证书原版一模一样哪里购买伯明翰大学毕业证(uob毕业证)学位证书原版一模一样
哪里购买伯明翰大学毕业证(uob毕业证)学位证书原版一模一样
mesfe
 
AI Considerations in HR Governance - Shahzad Khan - SocialHRCamp Ottawa 2024
AI Considerations in HR Governance - Shahzad Khan - SocialHRCamp Ottawa 2024AI Considerations in HR Governance - Shahzad Khan - SocialHRCamp Ottawa 2024
AI Considerations in HR Governance - Shahzad Khan - SocialHRCamp Ottawa 2024
SocialHRCamp
 
Building Meaningful Talent Communities with AI - Heather Pysklywec - SocialHR...
Building Meaningful Talent Communities with AI - Heather Pysklywec - SocialHR...Building Meaningful Talent Communities with AI - Heather Pysklywec - SocialHR...
Building Meaningful Talent Communities with AI - Heather Pysklywec - SocialHR...
SocialHRCamp
 
The Rules Do Apply: Navigating HR Compliance
The Rules Do Apply: Navigating HR ComplianceThe Rules Do Apply: Navigating HR Compliance
The Rules Do Apply: Navigating HR Compliance
Aggregage
 
原版定制(ucdavis毕业证书)加州大学戴维斯分校毕业证学位证书电子版原版一模一样
原版定制(ucdavis毕业证书)加州大学戴维斯分校毕业证学位证书电子版原版一模一样原版定制(ucdavis毕业证书)加州大学戴维斯分校毕业证学位证书电子版原版一模一样
原版定制(ucdavis毕业证书)加州大学戴维斯分校毕业证学位证书电子版原版一模一样
4y5yl5qy
 
Start Smart: Learning the Ropes of AI for HR - Celine Maasland - SocialHRCamp...
Start Smart: Learning the Ropes of AI for HR - Celine Maasland - SocialHRCamp...Start Smart: Learning the Ropes of AI for HR - Celine Maasland - SocialHRCamp...
Start Smart: Learning the Ropes of AI for HR - Celine Maasland - SocialHRCamp...
SocialHRCamp
 
How to Leverage AI to Boost Employee Wellness - Lydia Di Francesco - SocialHR...
How to Leverage AI to Boost Employee Wellness - Lydia Di Francesco - SocialHR...How to Leverage AI to Boost Employee Wellness - Lydia Di Francesco - SocialHR...
How to Leverage AI to Boost Employee Wellness - Lydia Di Francesco - SocialHR...
SocialHRCamp
 
Accelerating AI Integration with Collaborative Learning - Kinga Petrovai - So...
Accelerating AI Integration with Collaborative Learning - Kinga Petrovai - So...Accelerating AI Integration with Collaborative Learning - Kinga Petrovai - So...
Accelerating AI Integration with Collaborative Learning - Kinga Petrovai - So...
SocialHRCamp
 
1比1仿制(csun毕业证书)加州州立大学北岭分校毕业证硕士文凭原版一模一样
1比1仿制(csun毕业证书)加州州立大学北岭分校毕业证硕士文凭原版一模一样1比1仿制(csun毕业证书)加州州立大学北岭分校毕业证硕士文凭原版一模一样
1比1仿制(csun毕业证书)加州州立大学北岭分校毕业证硕士文凭原版一模一样
4y5yl5qy
 

Recently uploaded (13)

Rally Webinar Recruitment Marketing for High Volume Hiring.pdf
Rally Webinar Recruitment Marketing for High Volume Hiring.pdfRally Webinar Recruitment Marketing for High Volume Hiring.pdf
Rally Webinar Recruitment Marketing for High Volume Hiring.pdf
 
一模一样(unh毕业证书)美国新罕布什尔大学毕业证学位证书案例原版一模一样
一模一样(unh毕业证书)美国新罕布什尔大学毕业证学位证书案例原版一模一样一模一样(unh毕业证书)美国新罕布什尔大学毕业证学位证书案例原版一模一样
一模一样(unh毕业证书)美国新罕布什尔大学毕业证学位证书案例原版一模一样
 
Your Guide To Finding The Perfect Part-Time Job
Your Guide To Finding The Perfect Part-Time JobYour Guide To Finding The Perfect Part-Time Job
Your Guide To Finding The Perfect Part-Time Job
 
Becoming Relentlessly Human-Centred in an AI World - Erin Patchell - SocialHR...
Becoming Relentlessly Human-Centred in an AI World - Erin Patchell - SocialHR...Becoming Relentlessly Human-Centred in an AI World - Erin Patchell - SocialHR...
Becoming Relentlessly Human-Centred in an AI World - Erin Patchell - SocialHR...
 
哪里购买伯明翰大学毕业证(uob毕业证)学位证书原版一模一样
哪里购买伯明翰大学毕业证(uob毕业证)学位证书原版一模一样哪里购买伯明翰大学毕业证(uob毕业证)学位证书原版一模一样
哪里购买伯明翰大学毕业证(uob毕业证)学位证书原版一模一样
 
AI Considerations in HR Governance - Shahzad Khan - SocialHRCamp Ottawa 2024
AI Considerations in HR Governance - Shahzad Khan - SocialHRCamp Ottawa 2024AI Considerations in HR Governance - Shahzad Khan - SocialHRCamp Ottawa 2024
AI Considerations in HR Governance - Shahzad Khan - SocialHRCamp Ottawa 2024
 
Building Meaningful Talent Communities with AI - Heather Pysklywec - SocialHR...
Building Meaningful Talent Communities with AI - Heather Pysklywec - SocialHR...Building Meaningful Talent Communities with AI - Heather Pysklywec - SocialHR...
Building Meaningful Talent Communities with AI - Heather Pysklywec - SocialHR...
 
The Rules Do Apply: Navigating HR Compliance
The Rules Do Apply: Navigating HR ComplianceThe Rules Do Apply: Navigating HR Compliance
The Rules Do Apply: Navigating HR Compliance
 
原版定制(ucdavis毕业证书)加州大学戴维斯分校毕业证学位证书电子版原版一模一样
原版定制(ucdavis毕业证书)加州大学戴维斯分校毕业证学位证书电子版原版一模一样原版定制(ucdavis毕业证书)加州大学戴维斯分校毕业证学位证书电子版原版一模一样
原版定制(ucdavis毕业证书)加州大学戴维斯分校毕业证学位证书电子版原版一模一样
 
Start Smart: Learning the Ropes of AI for HR - Celine Maasland - SocialHRCamp...
Start Smart: Learning the Ropes of AI for HR - Celine Maasland - SocialHRCamp...Start Smart: Learning the Ropes of AI for HR - Celine Maasland - SocialHRCamp...
Start Smart: Learning the Ropes of AI for HR - Celine Maasland - SocialHRCamp...
 
How to Leverage AI to Boost Employee Wellness - Lydia Di Francesco - SocialHR...
How to Leverage AI to Boost Employee Wellness - Lydia Di Francesco - SocialHR...How to Leverage AI to Boost Employee Wellness - Lydia Di Francesco - SocialHR...
How to Leverage AI to Boost Employee Wellness - Lydia Di Francesco - SocialHR...
 
Accelerating AI Integration with Collaborative Learning - Kinga Petrovai - So...
Accelerating AI Integration with Collaborative Learning - Kinga Petrovai - So...Accelerating AI Integration with Collaborative Learning - Kinga Petrovai - So...
Accelerating AI Integration with Collaborative Learning - Kinga Petrovai - So...
 
1比1仿制(csun毕业证书)加州州立大学北岭分校毕业证硕士文凭原版一模一样
1比1仿制(csun毕业证书)加州州立大学北岭分校毕业证硕士文凭原版一模一样1比1仿制(csun毕业证书)加州州立大学北岭分校毕业证硕士文凭原版一模一样
1比1仿制(csun毕业证书)加州州立大学北岭分校毕业证硕士文凭原版一模一样
 

Networking & Security Fundamentals

  • 1. Networking & Security Made By: Ashish Sharma NEC
  • 3. Types Of Networks • LAN: Local Area Network For Small Business • MAN: Metropolitan area network For Cities or Campus • WAN: Wide Area Network Regional or National Networks
  • 4. Devices Used By Networks • Bridges (Old type of Switches) • Switches (For LAN basically connect Systems) • Routers (For inter- network communication)
  • 5. Interfaces for these Devices Console Interface
  • 7. Network Certifications Key Players in Network Certifications: • Cisco (CCNA, CCNP) • Juniper (JNCIA, JNCIE,JNCIP, JNCIS) • Microsoft ( MCSE, MCSA)
  • 8. Classification Of Cisco Exams • Routing and Switching Certification Exams • Data Center Certification Exams • Return to Top • Design Certification Exams • Security Certification Exams • Storage Networking Certification Exams • Voice Certification Exams • Wireless Certification Exams
  • 9. Cisco Exams • CCENT Cisco Certified Entry Networking Technician (ICND1) : Connecting Devices (1Exam) • CCNA Cisco Certified Network Associate (ICND1+ ICND2) :Routing and Switching (1Exam) • CCNP Cisco Certified Network Professional To plan, implement, verify and troubleshoot networks (3Exams) • CCIE Cisco Certified Internetwork Expert More Complex Network (9Exams)
  • 10. Juniper Exams • JNCIA - Juniper Networks Certified Internet Associate (10 exams) • JNCIP - Juniper Networks Certified Internet Professional (8 exams) • JNCIE - Juniper Networks Certified Internet Expert (6 exams) • JNCIS - Juniper Networks Certified Internet Specialist (13 exams)
  • 11. Network Operating System • A networking operating system (NOS), also referred to as the Dialoguer, is the software that runs on a server and enables the server to manage data, users, groups, security, applications, and other networking functions. • Cisco: Cisco IOS (Internetwork Operating System) (C/C++) • Juniper: JUNOS (C/C++)
  • 12. Types Of Security • Internet Security (In between Client and Server) • Network Security (Inside the Network) • Application Security( Application SDLC)
  • 13. Internet Security • Network Layer Security: By Cryptography on TCP/IP including SSL & TLS. • IPsec Protocol: Including Authentication Header & Encapsulating Security payload. • Security Token: Online Sites Providing 6-digit code changing randomly in 30-60 Sec. • Electronic Mail security (Email): Using PGP (Pretty Good Privacy) for encrypting. • Message Authentication Code: Encrypting message by using Code.
  • 14. •Firewalls: Screening Network Traffic Types of Firewalls •Packet Filters: Processing Data Packet by Packet •Circuit-Level Gateways: Operates at network level •Application-Level Gateways: Operates at application level.
  • 15. • Malicious Software & Antivirus • Malware: User is tricked to download a software • Virus: Code to steal data • Trojan Horse: Pretends as secure but malicious (Keygen) • Spyware: Monitor Activites
  • 16. Application Security • Measures taken throughout application life- cycle to prevent flaws in Security Policies. Includes • Input Validation • Authentication • Authorization • Configuration Mgmt. • Exception Management • Logging
  • 17. Network Security It consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network. Key Things: Policies, Administrator, monitor, network,misuse, modification
  • 18. Security Management • Firewall • Antivirus • Wireless: WEP/WPA/WPA2 • MAC Adress Filtering • Assign Static IP Address • Password changing on regular basis • Awareness program • Network Analyzer
  • 19. Attacks To Be Prevented • DoS Attack • Spoofing • Man in the Middle • SQL Injection