May 2023
Intermediate to advanced
800 pages
19h 12m
English
In this chapter, you will learn about
• Understanding how encryption works
• Implementing secured tunnel networks
• Configuring high-availability networking
• Understanding single sign-on
• Defending against network attacks
• Encrypting files with GPG
We came up with the standard to allow different CAD systems to communicate.
—Walt Braithwaite, Boeing
Unethical hackers have figured out that a minimal amount of information can yield huge profits, and they will stop at nothing to get it. As a result, ethical hackers must be obsessive about information security.
Network security is focused on protecting valuable electronic information of organizations and users. Therefore, the demand for IT ...