{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

ITP457-Study.Guide

ITP457-Study.Guide - StudyGuideITP457 o WhatisSecurity o o...

Info icon This preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
Study Guide – ITP 457 Lecture 1 – Security Overview o What is Security? Define the AIC in detail o How does security help business? o What is management support for security important? o Return on Investment o Risk Management o Security Methodology o Three D’s of Security o 5 Steps to Better Security o Security Strategy vs Tactics Lecture 2 ‐ Networking o OSI Model vs TCP/IP Model Know the layers Examples of each layer o Protocol o TCP vs UDP o Movement of Data Lecture 3 – Network Scanning o Know Nmap ‐sS , ‐sP, ‐sT Pros/Cons of each o Difference between port/ping scan o Know some Default Ports o Know how to read namp results o Difference between Nmap vs Unicronscan Lecture 4 –Vulnerability Scanner o Know how to use Nessus o How do they work Lecture 5 – Google hacking
Image of page 1

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}