Security pillars – confidentiality, integrity, and availabilityEncryption basics and protocolsServices provided by encryptionStream versus block ciphers Symmetric versus asymmetric encryption Public key infrastructure and certificate authorities Authentication basics and protocolsAuthentication typesUsername/password with IP address identification authenticationEncrypted username/password authenticationExtensible authentication protocol (EAP)Authorization and access protocolsHash functions and message digestsIPSec and key management protocolsVPNsIPSec principles of operationIPSec tunnel establishmentIPSec modes of operationIPSec authentication and encryption protocolsIPSec AH protocolIPSec ESP protocolSSL/TLS and proxiesProtocol basicsThe handshake protocolNetwork security components – RADIUS/TACACS+, FWs, IDS/IPSs, NAC, and WAFsFirewallsRADIUS, NAC, and other authentication featuresWeb application firewalls (WAFs)Summary Questions