This is a self-paced course that provides a continuation of network security topics. Among the topics covered are cryptographic algorithms used in networking protocols, TLS/SSL, IPSec Layer 2 Security, and Wireless Security. The material is essential in later classes that will develop ethical hacking skills. Students are provided with a broad understanding of cryptography, from its classical applications dating from the Roman empire to modern cryptography, including the public key cryptography and hashing techniques today. Next, we take what we learned about cryptography and apply it as a tool against attackers. Specifically, we'll discuss IP Security, TLS/SSL, and its use in Virtual Private Networks. We follow up with coverage of Layer 2 security and vulnerabilities, such as MAC attacks, VLAN hopping attacks, DHCP attacks, ARP attacks, spoofing attacks, and attacks on other protocols. We'll also go over common countermeasures to these attacks.
We conclude the course with an overview of how WiFi works, basic terminology and architecture, and how wireless networks are secured.