Live Chat
Monday - Friday 8am - 6pm EST Chat Now
Contact Us
Monday - Friday 8am - 8pm EST 1-866-716-6688 Other Contact Options
Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Recorded Webinar

Securing Communications

Date:
Feb. 23, 2011
Duration:
62m 35s

In this webinar, the second of two based on our Cybersecurity Foundations course, you'll build on what you learned in the first of the series, Protecting Your Network with Authentication and Cryptography.

Instructor:
Debbie Dahlin

Outline:

  • Applying Cryptography to OSI Model
  • Securing Services Using Cryptography
    • Web Servers
    • Mail Servers
  • Right Managements for Protecting Data
  • Network Traffic
  • VPN
    • Gateway-to-Gateway VPN
    • Host-to-Gateway VPN
  • Securing Network Traffic with IPsec
  • Wireless Weaknesses
  • Securing Wireless with Cryptography
    • WEP
    • WPA
    • WPA2
  • Steganography