Network Security Essentials


This course includes
Hands-On Labs

Network Security Essentials is your key to mastering the art of securing networks and data. Whether you're a student or a professional, this course covers everything you need to know about network security. From fundamental concepts to advanced topics, you'll learn how to protect sensitive information and defend against cyber threats. With interactive lessons and hands-on labs, you'll gain practical experience that will set you on the path to becoming a network security pro. Don't just learn about network security—practice it and excel in this critical field.


28+ Lessons | 58+ Exercises | 258+ Quizzes | 282+ Flashcards | 282+ Glossary of terms


3+ Pre Assessment Questions | 5+ Post Assessment Questions |

Hands-On Labs

28+ LiveLab | 28+ Video tutorials | 01:07+ Hours

Here's what you will learn

Download Course Outline

Lessons 1: Preface

  • What’s New in the Sixth Edition
  • Objectives
  • Support of ACM/IEEE Computer Science Curricula 2013
  • Plan of the Text
  • Projects and other Student Exercises
  • Relationship to Cryptography and Network Security
  • Acknowledgments

Lessons 2: Introduction

  • Computer Security Concepts
  • The OSI Security Architecture
  • Security Attacks
  • Security Services
  • Security Mechanisms
  • Fundamental Security Design Principles
  • Attack Surfaces and Attack Trees
  • A Model for Network Security
  • Standards
  • Review Questions, and Problems

Lessons 3: Symmetric Encryption and Message Confidentiality

  • Symmetric Encryption Principles
  • Symmetric Block Encryption Algorithms
  • Random and Pseudorandom Numbers
  • Stream Ciphers and RC4
  • Cipher Block Modes of Operation
  • Review Questions, and Problems

Lessons 4: Public-Key Cryptography and Message Authentication

  • Approaches to Message Authentication
  • Secure Hash Functions
  • Message Authentication Codes
  • Public-Key Cryptography Principles
  • Public-Key Cryptography Algorithms
  • Digital Signatures
  • Review Questions, and Problems

Lessons 5: Key Distribution and User Authentication

  • Remote User Authentication Principles
  • Symmetric Key Distribution Using Symmetric Encryption
  • Kerberos
  • Key Distribution Using Asymmetric Encryption
  • X.509 Certificates
  • Public-Key Infrastructure
  • Federated Identity Management
  • Review Questions, and Problems

Lessons 6: Network Access Control and Cloud Security

  • Network Access Control
  • Extensible Authentication Protocol
  • IEEE 802.1X Port-Based Network Access Control
  • Cloud Computing
  • Cloud Security Risks and Countermeasures
  • Data Protection in the Cloud
  • Cloud Security as a Service
  • Addressing Cloud Computing Security Concerns
  • Review Questions, and Problems

Lessons 7: Transport-Level Security

  • Web Security Considerations
  • Transport Layer Security
  • Secure Shell (SSH)
  • Review Questions, and Problems

Lessons 8: Wireless Network Security

  • Wireless Security
  • Mobile Device Security
  • IEEE 802.11 Wireless LAN Overview
  • IEEE 802.11i Wireless LAN Security
  • Review Questions, and Problems

Lessons 9: Electronic Mail Security

  • Internet Mail Architecture
  • E-mail Formats
  • E-mail Threats and Comprehensive E-mail Security
  • S/MIME
  • Pretty Good Privacy
  • DNS-Based Authentication of Named Entities
  • Sender Policy Framework
  • Domainkeys Identified Mail
  • Domain-Based Message Authentication, Reporting, and Conformance
  • Review Questions, and Problems

Lessons 10: IP Security

  • Ip Security Overview
  • Ip Security Policy
  • Encapsulating Security Payload
  • Combining Security Associations
  • Internet Key Exchange
  • Cryptographic Suites
  • Review Questions, And Problems

Lessons 11: Malicious Software

  • Types of Malicious Software (Malware)
  • Advanced Persistent Threat
  • Propagation—Infected Content—Viruses
  • Propagation—Vulnerability Exploit—Worms
  • Propagation—Social Engineering—Spam e-mail, Trojans
  • Payload—System Corruption
  • Payload—Attack Agent—Zombie, Bots
  • Payload—Information Theft—Keyloggers, Phishing, Spyware
  • Payload—Stealthing—Backdoors, Rootkits
  • Countermeasures
  • Distributed Denial of Service Attacks
  • Review Questions, and Problems

Lessons 12: Intruders

  • Intruders
  • Intrusion Detection
  • Password Management
  • Review Questions, and Problems

Lessons 13: Firewalls

  • The Need for Firewalls
  • Firewall Characteristics and Access Policy
  • Types of Firewalls
  • Firewall Basing
  • Firewall Location and Configurations
  • Review Questions, and Problems

Lessons 14: Network Management Security

  • Basic Concepts of SNMP
  • SNMPv1 Community Facility
  • SNMPv3
  • Recommended Reading
  • References
  • Review Questions, and Problems

Lessons 15: Legal and Ethical Aspects

  • Cybercrime and Computer Crime
  • Intellectual Property
  • Privacy
  • Ethical Issues
  • Recommended Reading
  • References
  • Review Questions, and Problems

Lessons 16: SHA-3

  • The Origins of SHA-3
  • Evaluation Criteria for SHA-3
  • The Sponge Construction
  • The SHA-3 Iteration Function f
  • Recommended Reading and Referencess
  • Review Questions, and Problems

Appendix A: Some Aspects of Number Theory

  • Prime and Relatively Prime Numbers
  • Modular Arithmetic

Appendix B: Projects for Teaching Network Security

  • Research Projects
  • Hacking Project
  • Programming Projects
  • Laboratory Exercises
  • Practical Security Assessments
  • Firewall Projects
  • Case Studies
  • Writing Assignments
  • Reading/Report Assignments

Appendix C: Standards and Standard-Setting Organizations

  • The Importance of Standards
  • Internet Standards and the Internet Society
  • The National Institute of Standards and Technology
  • The International Telecommunication Union
  • The International Organization for Standardization
  • Significant Security Standards and Documents

Appendix D: TCP/IP and OSI

  • Protocols And Protocol Architectures
  • The TCP/IP Protocol Architecture
  • The Role Of An Internet Protocol
  • IPV4
  • IPV6
  • The OSI Protocol Architecture

Appendix E: Pseudorandom Number Generation

  • Prng Requirements
  • Pseudorandom Number Generation Using a Block Cipher
  • Pseudorandom Number Generation Using Hash Functions and MACs

Appendix F: Kerberos Encryption Techniques

  • Password-To-Key Transformation
  • Propagating Cipher Block Chaining Mode

Appendix G: Data Compression Using ZIP

  • Compression Algorithm
  • Decompression Algorithm

Appendix H: PGP

  • Notation
  • Operational Description
  • Cryptographic Keys And Key Rings
  • Public-Key Management
  • Pgp Random Number Generation

Appendix I: The International Reference Alphabet

Appendix J: The Base Rate Fallacy

  • Conditional Probability and Independence
  • Bayes’ Theorem
  • The Base-Rate Fallacy Demonstrated
  • References

Appendix K: Radix-64 Conversion

Lessons 28: References

Hands-on LAB Activities

Symmetric Encryption and Message Confidentiality

  • Configuring a Wireless AP
  • Establishing a SSH Connection
  • Observing a SHA256-Generated Hash Value
  • Examining Asymmetric Encryption
  • Observing an MD5-Generated Hash Value
  • Generating a Symmetric Key
  • Performing Symmetric Encryption

Key Distribution and User Authentication

  • Examining Kerberos Settings
  • Examining PKI Certificates

Wireless Network Security

  • Exploiting SNMP
  • Securing a Wi-Fi Hotspot
  • Creating a Network Policy for 802.1X
  • Using a Wireless AP for MAC Address Filtering

Electronic Mail Security

  • Configuring DNS Information

IP Security

  • Configuring an IPsec Policy

Malicious Software

  • Creating a Remote Access Trojan (RAT)
  • Installing Antivirus Software
  • Configuring IPSec
  • Testing an Antivirus Program
  • Simulating a DoS Attack
  • Simulating a DDoS Attack


  • Understanding Local Privilege Escalation
  • Setting Up a Honeypot


  • Using Windows Firewall
  • Whitelisting an IP Address in the Windows Firewall
  • Creating Outbound and Inbound Rules for a Firewall

Network Management Security

  • Configuring SNMPv2c
  • Configuring SNMPv3