Information Technology Reference
In-Depth Information
Objective
Corresponding Topic Chapter
5.0 Security
5.1 Explain network security concepts, tools, and best
practices.
Chapter 11
ACLs
VPNs
IDS/IPS hardware/software-based firewalls
DMZ
Review / audit logs
Attacks
DDoS
Ping of death
Ping flood
5.2 Explain storage security concepts, methods,
and best practices.
Chapter 11
Obfuscation
Access Control Lists
Zoning
LUN masking
User and host authentication
Review/audit logs
5.3 Compare and contrast different encryption technologies
and methods.
Chapter 11
PKI
IPSEC
SSL/TLS
Ciphers
AES
3DES
RSA
DSA
RC4
RC5
Encryption for data in transit and encryption for data
at rest
Search WWH ::




Custom Search