1 minute read

OUTCOMES

1. Identify and describe communication network vulnerabilities, denial of service (DoS) attacks, threats, and threat mitigation strategies.

2.Apply best practices in the design and implementation of secure communications networks.

3. Describe the essential elements, policies and protocols used by communication network systems.

4. Identify and compare physical and network security concerns and solutions, related to technologies and protocols, including VPN, proxy, NAT, DHCP,VoIP and mobile communications.

5.Assess the benefits and limitations of network defenses and their importance to e-mail, ecommerce, and other critical business functions.

6.Apply existing technology in cellular, wireless and wired networks to maintain efficient network performance and harden and secure networks and systems.

This article is from: