Chapter 12. Network Security
Chapter Outline
12-2 Intrusion (How an Attacker Gains Control of a Network)
12-4 Security Software and Hardware
12-5 Introduction to the Virtual Private Network
Objectives
• Examine how an attacker gains control of a network
• Understand how denial of service attacks are initiated
• Examine the security software and hardware used to protect the network
• Understand the VPN technologies
Key Terms
Get Networking Essentials, Third Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.