Lesson Plan
Subject Aims:
After completing this course, participants will be able to:
• To be able to understand computer network and information security.
• To be able to learn why network security is important
• To be able to explain network security prevention, detection and response.
• To be able to define and explain the concept of network confidentiality, information integrity, network availability, network auditability.
• To be able to understand management’s role in the development, implementation and maintenance of network security.
• To be able to understand security architecture, it’s principles, components and employment.
• To be able to understand the relationship between risks, threats, vulnerabilities and countermeasures.
• To be able to understand the need for constantly evaluating the status of security management.
• To be able to understand the difference between policies, procedures, standards, guidelines, encryption, cryptography terms, firewalls.
• To be able to understand operation of Virtual Private Networks, importance of authentication and the characteristics of a good password.
After completing this course, participants will be able to:
• To be able to understand computer network and information security.
• To be able to learn why network security is important
• To be able to explain network security prevention, detection and response.
• To be able to define and explain the concept of network confidentiality, information integrity, network availability, network auditability.
• To be able to understand management’s role in the development, implementation and maintenance of network security.
• To be able to understand security architecture, it’s principles, components and employment.
• To be able to understand the relationship between risks, threats, vulnerabilities and countermeasures.
• To be able to understand the need for constantly evaluating the status of security management.
• To be able to understand the difference between policies, procedures, standards, guidelines, encryption, cryptography terms, firewalls.
• To be able to understand operation of Virtual Private Networks, importance of authentication and the characteristics of a good password.
Views | |
---|---|
60 | Total Views |
2 | Members Views |
58 | Public Views |
Share by mail
Please login to share this document by email.
External sources