September 2005
Intermediate to advanced
552 pages
14h 48m
English
Netadmins perform network security testing to assess and verify the threats and vulnerabilities of their network. This chapter introduces you to the following tools and methodologies of security testing:
• Linux-based live CD
• Network scanners
• Vulnerability scanners
• Packet analyzers
The topics covered in this chapter require you to be familiar with the mechanics of the Transmission Control Protocol/Internet Protocol (TCP/IP) model, with reference to the seven layers of the Open System Interconnection (OSI) reference model.
Network security is an ongoing process that is best described by the Cisco security wheel. The security wheel, as shown in Figure 7-1, consists of the ...
Read now
Unlock full access