Security+ Certification/Network Infrastructure
2.1 Differentiate between the different port & protocols, their respective threats and mitigation techniques
edit
|
|
2.2 Distinguish between network design elements and components
edit
|
|
2.3 Determine the appropriate use of network security tools to facilitate network security
edit
|
|
2.4 Apply the appropriate network tools to facilitate network security
edit- NIDS
- Firewals
- Proxy servers
- Internet content filters
- Protocol analyzers
2.5 Explain the vulnerabilities and mitigations associated with network devices
edit- Privelege escalation
- Weak passwords
- Back doors
- Default accounts
- DOS
2.6 Explain the vulnerabilities and mitigations associated with various transmission media
edit- Vampire taps
2.7 Explain the vulnerabilities and implement mitigations associated with wireless networking
edit
|
|