Apparatus software. Wed def. telecom. systems

Replenishment date: 23.06.2020
Content: Apparatus. Wed def. telecom. system.rar (2.03 MB)
️Automatic issue of goods ✔️
Sales:
0
Refunds:
0
Reviews:
0
Views:
146
Seller
Seller:
Danylo
Rating:
0,01
Ask a Question
Report a violation
Seller discounts
for all goods
The goods are given a discount for regular customers.
If the total amount of purchases from a Danylo seller is more than:
the discount is: 1%
Description
Hardware and software for telecommunication systems protection

Contents:
Lecture No. 1 Subject and tasks of software and hardware information security. Basic concepts, basic components.
Lecture number 2 The most common stacks of communication protocols of modern computer systems ОSI_ISO17 IPX_SPX NetBios_SMB, TCP_IP
Lecture number 3 The main type of architecture of modern networks. Peer-to-peer, client-server, distributed or cloud.
Lecture number 4 Vulnerability of computer systems
Lecture № 5 Basic concepts and concepts identification and authentication Identification schemes.
Lecture No. 6 Protection of information in the TCS from unauthorized access.
Lecture 7 Security subsystem of operating systems Windows
Lecture number 8 Security subsystem of operating systems OS Linux
Lecture number 9 Fixed assets, copy protection functions
Lecture number 10 Computer viruses and protection against them.
Lecture number 11 Trojan horses. Network worms. Secret passages.
Lecture 12 Kernel-level user-level rootkits
Lecture 13 Malicious programs for mobile devices.
Lecture number 14 Antivirus programs. Prevention of computer viruses. Detection of an unknown virus
Lecture number 15 Fundamentals of network and internetworking. Information Security
Lecture number 16 Risk management. Basic concepts, risk assessment.
Lecture 17 Classification of remote threats in telecommunication networks.
Lecture number 18 Classification, characteristics of firewalls.
Lecture number 19 Connection-level firewalls, kernel-level
Lecture number 20 Bypassing firewalls. Testing firewalls.
Lecture No. 21 Testing of intrusion detection systems, intrusion prevention systems.
Lecture number 22 Methods for bypassing network and host intrusion detection systems
Lecture No. 23 The essence and content of the technology of virtual network parts (VPN)
Lecture number 24 IPsec protocols. Security Association
Similar items
System Modeling
Seller:
alevtina_sar
Rating:
3,16
Sales:
0
price:
3,10 $
System Modeling Synergy
Seller:
alevtina_sar
Rating:
3,16
Sales:
0
price:
3,21 $
information systems development
Seller:
xfoster
Rating:
0
Sales:
0
price:
2,00 $
Abstract "Program for security of int.systems"
Seller:
Курсив
Rating:
0
Sales:
0
price:
1,00 $
Theory of information processes and systems
Seller:
alevtina_sar
Rating:
3,16
Sales:
2
price:
3,21 $