Security+ Certification/Network Infrastructure
2.1 Differentiate between the different port & protocols, their respective threats and mitigation techniques edit
|
|
2.2 Distinguish between network design elements and components edit
|
|
2.3 Determine the appropriate use of network security tools to facilitate network security edit
|
|
2.4 Apply the appropriate network tools to facilitate network security edit
- NIDS
- Firewals
- Proxy servers
- Internet content filters
- Protocol analyzers
2.5 Explain the vulnerabilities and mitigations associated with network devices edit
- Privelege escalation
- Weak passwords
- Back doors
- Default accounts
- DOS
2.6 Explain the vulnerabilities and mitigations associated with various transmission media edit
- Vampire taps
2.7 Explain the vulnerabilities and implement mitigations associated with wireless networking edit
|
|