Introduction

Introduction - management systems and entities and methods...

Info iconThis preview shows pages 1–5. Sign up to view the full content.

View Full Document Right Arrow Icon
Networking Raffles Education Group – Raffles Academy
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Overview and Aims This module is designed to Provides necessary information to plan, implement and maintain a secure network. Build an understanding on critical strategies, concepts and solutions to keep the network system secure.
Background image of page 2
Module Content 1.Introduction - The Concept of a Protocol and Standards 2.Internet Protocols, Routing Protocols,UDP,TCP,SCTP 3.Information security and legal issues in information security 4.Encryption and firewalls 5.Information security process 6.Network Management, Network Security & Authentification
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Learning Outcomes Knowledge and Understanding. After studying this module you should be able to: Apply knowledge of network management, security including
Background image of page 4
Background image of page 5
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: management systems and entities and methods for security management including use of industry tools. Skills, qualities and attributes. After studying this module you should be able to: Manage, monitor, and troubleshoot Network Address Translation and Certificate Services on a network infrastructure. Configure a network Reading Materials Module Material Stallings, W. (2006) Network Security Essentials: Applications and Standards (Third Edition), Prentice Hall. Data Communication and Networking 4 th Edition Behrouz A Forouzan Reference Material Introduction to Modern Cryptography: Principles and Protocols (Chapman & Hall/Crc Cryptography and Network Security Series) by Jonathan Katz and Yehuda Lindell ,Aug 31,...
View Full Document

This document was uploaded on 03/12/2010.

Page1 / 5

Introduction - management systems and entities and methods...

This preview shows document pages 1 - 5. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online