TCP/IP Security and IPv6

placeholder

Any discussion of networking would not be complete without addressing information security. The TCP/IP protocols were not originally designed with security in mind. In this course youll explore common vulnerabilities at each layer of the TCP/IP module and common mitigations for those security weaknesses. Youll learn the components of the CIA triad as well as some vulnerabilities and attacks at each of the four layers of the TCP/IP model. Next youll examine the network access layer security protocols the components of IPsec and the phases of an IPsec session. Youll learn about the role of virtual private networking in providing TCP/IP security. Finally youll explore how Transport Layer Security Domain Name System Security Extensions and Secure Shell Protocol are involved in TCP/IP security. Internet Protocol version 4 is now more than 30 years old. Among other consequences of its advancing age the public Internet has depleted the available addresses that can be assigned. While several efforts have been developed to address this problem the true solution is in the implementation of Internet Protocol version 6. In this course youll also explore the three categories of IPv6 address and their format and structure. Youll learn the process of mapping an IEEE MAC address into a 64-bit EUI format for IPv6 address. Youll also examine the types of IPv6 address the characteristics of the IPv6 header and the common types of ICMPv6 messages. Finally youll learn to describe changes to the DNS records with IPv6 and about modifications to common routing protocols used with IPv6. This course was originally created by Global Knowledge (GK).