Information Security: Securing Networking Protocols

placeholder

Learners can explore the key concept of the common protocols in use and discover the security issues of the transmission control protocol/Internet protocol (TCP/IP) model and security protocols in this 10-video course. You will begin by taking a look at the common protocols used in a network the ports they use and the type they are and what they do. Next you will examine some of the security issues of the TCP/IP model at the layer level of which it has four: application transport Internet and data link. You will also explore the threats vulnerabilities and mitigation techniques in network security; identify the types of weak protocols and their replacements; and classify the various types of security protocols. Then learners will continue by examining various ways to use security protocols in different situations; the importance of implementing security protocols. In the final tutorial learners will explore the security-first mindset and its necessity.