Skip to content

comprehensive overview and resources related to network security principles and practices.

Notifications You must be signed in to change notification settings

maryamirfan18/Network-Security

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

9 Commits
 
 
 
 

Repository files navigation

Network-Security

This repository contains a comprehensive overview and resources related to network security principles and practices. Topics covered include various forms of cyber-attacks, defense mechanisms, encryption, firewalls, intrusion detection systems, and protocols. This information is geared towards improving understanding of network security for both academic and professional environments.

Key Topics:

  1. Networking
  2. Networking at a Glance
  3. Open Systems Interconnection (OSI) Model
  4. Transmission Control Protocol/Internet Protocol (TCP/IP)
  5. Internet Protocol (IPv4 and IPv6)
  6. WiFi
  7. Ports and Protocols (Applications/Services)
  8. Types of Threats
  9. Intrusion Detection Systems
    -Host-based Intrusion Detection System (HIDS)
    -Network Intrusion Detection System (NIDS)
  10. Security Information and Event Management (SIEM)
  11. Preventing Threat
  12. Antivirus
  13. Scans
  14. Firewalls
  15. Intrusion Prevention System (IPS)
  16. On-Premises Data Centers
  17. Redundancy
  18. Memorandum of Understanding (MOU) / Memorandum of Agreement (MOA)
  19. Cloud
  20. Service Model
  21. Deployment Model
  22. Managed Service Provider (MSP)
  23. Service-Level Agreement (SLA)
  24. Network Design
  25. Defense in Depth
  26. Zero Trust
  27. Network Access Control (NAC)
  28. Network Segmentation (Demilitarized Zone)
  29. Segmentation for Embedded Systems and IoT
  30. Microsegmentation

Objectives:

• Provide in-depth knowledge on how to safeguard networks from various security threats.
• Explore modern network security tools and strategies.
• Offer practical examples and case studies related to network protection.

Repository Contents:

• Documentation: Detailed resources and explanations of network security concepts.
• Case Studies: Real-world examples demonstrating the importance of robust security measures.

About

comprehensive overview and resources related to network security principles and practices.

Topics

Resources

Stars

Watchers

Forks