You understand TCP/IP and you’re making it work, and now it’s time to make sure it’s secure while it’s working. In this course, you’ll explore the fundamentals of TCP/IP security: symmetric and asymmetric encryption, cryptographic hashes, access control, single sign-on and more. You’ll look at certificates and trust (including certificate error scenarios) and familiarize yourself with the guard dog program for wired networks, Kerberos.
Making TCP/IP SecureDuration: 4:25
Learn about the three core areas that provide security and access to TCP data to create a strong security program.
Symmetric EncryptionDuration: 5:32
In this episode, Mike explores the simplest type of encryption, symmetric encryption. Both parties have the same key to encrypt and decrypt.
Asymmetric EncryptionDuration: 3:19
In this episode, Mike describes encryption that uses public and private keys for encrypting and decrypting text.
Cryptographic HashesDuration: 4:56
In this episode, Mike demonstrates how hashes, such as MD5 and SHA-1, work.
IdentificationDuration: 12:11
In this episode, Mike explains the issues of proving that you are who you are.
Access ControlDuration: 4:20
In this episode, Mike dives into access control lists, describing the three levels of control commonly used in computing.
AAADuration: 4:59
Mike describes the primary tools for providing network authentication, authorization and accounting: notably RADIUS and TACACS+.
Kerberos/EAPDuration: 7:33
In this episode, Mike discusses two commonly used authentication mechanisms for remote connectivity: Kerberos and EAP.
Single Sign-OnDuration: 10:09
In this episode, Mike describes how to log in to one computer and gain access to many.
Certificates and TrustDuration: 13:51
In this episode, Mike explains certificates and how they are used to establish trust.
Certificate Error ScenariosDuration: 8:06
In this episode, Mike looks at issues that can arise when using certificates.