Chapter 12. Network Security
After completion of this chapter, you will be able to answer the following questions:
What are the goals of network security, and what sorts of attacks do you need to defend against?
What best practices can be implemented to defend against security threats?
What are the characteristics of various remote-access security technologies?
How can firewalls be used to protect an organization’s internal network, while allowing connectivity to an untrusted network such as the Internet?
How can virtual private networks (VPNs) be used to secure traffic as that traffic flows over an untrusted network?
What is the difference between intrusion prevention and intrusion detection systems, and how do they protect an organization ...
Get CompTIA Network+ N10-007 Cert Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.