SlideShare a Scribd company logo
Introduction to Network Security
BN1023 – Demo PPT
Demo Network Security
http://www.conlinetraining.com/courses/network-security-online-training/
Network Security
• What is network security?
• How does it protect you?
• How does network security work?
http://www.conlinetraining.com/courses/network-security-online-training/
Network Security
• Network Security is the process of taking physical and
software preventative measures to protect the
underlying networking infrastructure from
unauthorized access, misuse, malfunction,
modification, destruction, or improper disclosure,
thereby creating a secure platform for computers,
users and programs to perform their permitted critical
functions within a secure environment.
http://www.conlinetraining.com/courses/network-security-online-training/
Security Management
• Security management for networks is
different for all kinds of situations. A home or
small office may only require basic security
while large businesses may require high-main
tenance and advanced software and hardware
to prevent malicious attacks from hacking
and spamming
http://www.conlinetraining.com/courses/network-security-online-training/
Network Security Threats
Many network security threats today are spread over the Internet.
The most common include:
• Viruses, worms, and Trojan horses
• Spyware and adware
• Zero-day attacks, also called zero-hour attacks
• Hacker attacks
• Denial of service attacks
• Data interception and theft
• Identity theft
http://www.conlinetraining.com/courses/network-security-online-training/
Types of Attacks
Active : - in which an intruder initiates commands
to disrupt the network's normal operation.
Passive: - when a network intruder intercepts data
traveling through the network
http://www.conlinetraining.com/courses/network-security-online-training/
Network Types
Passive Network Types:-
– Wiretapping
– Port scanner
– Idle scan
Active Network Types:-
Denial-of-service attack
DNS spoofing
Man in the middle
ARP poisoning
Buffer overflow
SQL injection
Phishing
http://www.conlinetraining.com/courses/network-security-online-training/
Questions ???
http://www.conlinetraining.com/courses/network-security-online-training/
Email us : info@conlineTraining.com
Visit : www.conlinetraining.com

More Related Content

PDF
Software-Brochure-2
Prahlad Reddy
 
PDF
Avoid These Top 15 IT Security Threats
JumpCloud
 
PDF
Securing your presence at the perimeter
Ben Rothke
 
PPTX
Expetec Company Overview
expetec
 
PPTX
Why SMBs Outsource IT to MSPs
The TNS Group
 
PDF
Manage Remote Workers in Three Easy Steps
JumpCloud
 
DOCX
Symantec Data Loss Prevention - Technical Proposal (General)
Iftikhar Ali Iqbal
 
PPTX
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
PreetiDevidas
 
Software-Brochure-2
Prahlad Reddy
 
Avoid These Top 15 IT Security Threats
JumpCloud
 
Securing your presence at the perimeter
Ben Rothke
 
Expetec Company Overview
expetec
 
Why SMBs Outsource IT to MSPs
The TNS Group
 
Manage Remote Workers in Three Easy Steps
JumpCloud
 
Symantec Data Loss Prevention - Technical Proposal (General)
Iftikhar Ali Iqbal
 
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
PreetiDevidas
 

What's hot (20)

PDF
08 Transform Endpoint Security with the World’s Most Secure PCs and Printers
eLearning Consortium 電子學習聯盟
 
PDF
02 學校網絡安全漏洞的評估分享, 管理挑戰及趨勢。
eLearning Consortium 電子學習聯盟
 
PPTX
Security architecture, engineering and operations
Piyush Jain
 
PDF
System of security controls
S.E. CTS CERT-GOV-MD
 
PDF
5 Steps to Successful BYOD Implementation
JumpCloud
 
PPT
Summer Tour CCH Event L2TC
Bill Watters
 
PPTX
Rothke rsa 2013 - deployment strategies for effective encryption
Ben Rothke
 
PPTX
ISS CAPSTONE TEAM
Jonathan Fuller
 
PDF
Securing Your Network
ePlus
 
PDF
Tesseract Service Portfolio
Tesseract Consulting
 
PPT
Guard Era Security Overview Preso (Draft)
GuardEra Access Solutions, Inc.
 
PDF
The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?
IBM Security
 
PDF
Cloud Software - Cloud-based System Security
Net at Work
 
PPTX
Cyber Security # Lec 4
Kabul Education University
 
PPTX
Gartner technologies for Infosec 2014-2015
Samuel Kamuli
 
PPTX
The Biggest Mistake you can make with your Data Center Licenses
Ivanti
 
PPT
Information Security Awareness And Training Business Case For Web Based Solut...
Michael Kaishar, MSIA | CISSP
 
PDF
Safeguard Your Business
DWP Information Architects Inc.
 
08 Transform Endpoint Security with the World’s Most Secure PCs and Printers
eLearning Consortium 電子學習聯盟
 
02 學校網絡安全漏洞的評估分享, 管理挑戰及趨勢。
eLearning Consortium 電子學習聯盟
 
Security architecture, engineering and operations
Piyush Jain
 
System of security controls
S.E. CTS CERT-GOV-MD
 
5 Steps to Successful BYOD Implementation
JumpCloud
 
Summer Tour CCH Event L2TC
Bill Watters
 
Rothke rsa 2013 - deployment strategies for effective encryption
Ben Rothke
 
ISS CAPSTONE TEAM
Jonathan Fuller
 
Securing Your Network
ePlus
 
Tesseract Service Portfolio
Tesseract Consulting
 
Guard Era Security Overview Preso (Draft)
GuardEra Access Solutions, Inc.
 
The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?
IBM Security
 
Cloud Software - Cloud-based System Security
Net at Work
 
Cyber Security # Lec 4
Kabul Education University
 
Gartner technologies for Infosec 2014-2015
Samuel Kamuli
 
The Biggest Mistake you can make with your Data Center Licenses
Ivanti
 
Information Security Awareness And Training Business Case For Web Based Solut...
Michael Kaishar, MSIA | CISSP
 
Safeguard Your Business
DWP Information Architects Inc.
 
Ad

Viewers also liked (12)

DOCX
arbors logo
DAWN TUITE
 
PDF
App
kbabarkhan
 
PDF
Framing the problem statement
Paturi Dheeraj
 
PDF
Certified Enrollment AY2012-2016
Dr. Chantel A. Perry (Dr. C)
 
PDF
Paralegal_Logo
Paul Folkes
 
PPTX
Presentation1
Mouiz Khashab
 
PDF
A. Basdou - Reference Letter
Alexandra Basdou
 
PPT
Slider
nulyarias
 
PPTX
До 90-річчя Людмили Сатосової
Odesa National Scientific Library
 
PPT
В пам`ять про Сюзанну Саварі-Полідорі (1929-2016)
Odesa National Scientific Library
 
PPTX
Quality of Life in Chronic Wound Patients-Final Presentation
Laura Shearman
 
PPT
Gestion Conocimiento VS Impacto Sostenibilidad
Alvaro Carpio
 
arbors logo
DAWN TUITE
 
Framing the problem statement
Paturi Dheeraj
 
Certified Enrollment AY2012-2016
Dr. Chantel A. Perry (Dr. C)
 
Paralegal_Logo
Paul Folkes
 
Presentation1
Mouiz Khashab
 
A. Basdou - Reference Letter
Alexandra Basdou
 
Slider
nulyarias
 
До 90-річчя Людмили Сатосової
Odesa National Scientific Library
 
В пам`ять про Сюзанну Саварі-Полідорі (1929-2016)
Odesa National Scientific Library
 
Quality of Life in Chronic Wound Patients-Final Presentation
Laura Shearman
 
Gestion Conocimiento VS Impacto Sostenibilidad
Alvaro Carpio
 
Ad

Similar to Bn 1023 demo network security (20)

PPTX
UNIT_1_-_Introduction_to_Cyber_Security_Updated.pptx
vishnupriyapm4
 
PPTX
All About Cyber Security Orientation Program (Foundational Level).pptx
Infosectrain3
 
PPTX
Cloud Security Issues and Challenge.pptx
Infosectrain3
 
PPTX
All About Cyber Security Orientation Program (Foundational Level).pptx
infosec train
 
PPTX
Cyber Security.pptx
AnushkaThakur11
 
PDF
Chapter 1 introduction(web security)
Kirti Ahirrao
 
PPTX
UNIT 1 - Introduction to Cyber Security - Prof_Jishnu_M_S
jishnums10
 
PPTX
Network security
Pooja Dewangan
 
PDF
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
Belayet Hossain
 
PPTX
CYBER SECURITY.pptx
Malu704065
 
PDF
Cyber Security
IRJET Journal
 
PDF
Network Security Research Paper
Pankaj Jha
 
PPTX
How to Get into Cybersecurity 2024 Action Plan.pptx
AkhilKumar529314
 
PDF
Platform Embedded Security Technology Revealed 1st Edition Xiaoyu Ruan (Auth.)
rezdjcggvq3827
 
DOCX
Seguridad web -articulo completo- ingles
isidro luna beltran
 
PDF
Advantages and Disadvantages of Network Security.pdf
Careerera
 
PDF
network security.pdf
JeganathanJayaran
 
DOC
Network Security Essentials for IT Professionals.doc
TCCI Computer Coaching
 
PPTX
What is Cyber & information security.pptx
amnamahfooz615
 
PPTX
Skills that make network security training easy
EC-Council
 
UNIT_1_-_Introduction_to_Cyber_Security_Updated.pptx
vishnupriyapm4
 
All About Cyber Security Orientation Program (Foundational Level).pptx
Infosectrain3
 
Cloud Security Issues and Challenge.pptx
Infosectrain3
 
All About Cyber Security Orientation Program (Foundational Level).pptx
infosec train
 
Cyber Security.pptx
AnushkaThakur11
 
Chapter 1 introduction(web security)
Kirti Ahirrao
 
UNIT 1 - Introduction to Cyber Security - Prof_Jishnu_M_S
jishnums10
 
Network security
Pooja Dewangan
 
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
Belayet Hossain
 
CYBER SECURITY.pptx
Malu704065
 
Cyber Security
IRJET Journal
 
Network Security Research Paper
Pankaj Jha
 
How to Get into Cybersecurity 2024 Action Plan.pptx
AkhilKumar529314
 
Platform Embedded Security Technology Revealed 1st Edition Xiaoyu Ruan (Auth.)
rezdjcggvq3827
 
Seguridad web -articulo completo- ingles
isidro luna beltran
 
Advantages and Disadvantages of Network Security.pdf
Careerera
 
network security.pdf
JeganathanJayaran
 
Network Security Essentials for IT Professionals.doc
TCCI Computer Coaching
 
What is Cyber & information security.pptx
amnamahfooz615
 
Skills that make network security training easy
EC-Council
 

More from conline training (20)

PDF
Bn 1024 demo ccnp
conline training
 
PDF
Bn 1023 demo ccna
conline training
 
PDF
Bn 1022 demo mcse 2012
conline training
 
PDF
Bn 1021 demo digital marketing
conline training
 
PDF
Bn 1019 demo sql server 2012
conline training
 
PDF
Bn 1018 demo pl sql
conline training
 
PDF
Bn 1016 demo postgre sql-online-training
conline training
 
PDF
B10014 ppt for msbi
conline training
 
PDF
B1015 demo on selenium testing tools
conline training
 
PDF
Bn1038 demo pega
conline training
 
PDF
Bn1037 demo oracle sql
conline training
 
PDF
Bn1033 demo sap basis
conline training
 
PDF
Bn1032 demo sap bo
conline training
 
PDF
Bn1031 demo sap ehs
conline training
 
PDF
Bn1030 oracle dba
conline training
 
PDF
Bn1029 demo sap sd
conline training
 
PDF
Bn1028 demo hadoop administration and development
conline training
 
PDF
Bn1025 demo basic unix
conline training
 
PDF
Bn1017 a demo rdbms
conline training
 
PDF
Bn1013 demo sap success factors
conline training
 
Bn 1024 demo ccnp
conline training
 
Bn 1023 demo ccna
conline training
 
Bn 1022 demo mcse 2012
conline training
 
Bn 1021 demo digital marketing
conline training
 
Bn 1019 demo sql server 2012
conline training
 
Bn 1018 demo pl sql
conline training
 
Bn 1016 demo postgre sql-online-training
conline training
 
B10014 ppt for msbi
conline training
 
B1015 demo on selenium testing tools
conline training
 
Bn1038 demo pega
conline training
 
Bn1037 demo oracle sql
conline training
 
Bn1033 demo sap basis
conline training
 
Bn1032 demo sap bo
conline training
 
Bn1031 demo sap ehs
conline training
 
Bn1030 oracle dba
conline training
 
Bn1029 demo sap sd
conline training
 
Bn1028 demo hadoop administration and development
conline training
 
Bn1025 demo basic unix
conline training
 
Bn1017 a demo rdbms
conline training
 
Bn1013 demo sap success factors
conline training
 

Recently uploaded (20)

PPTX
Virus sequence retrieval from NCBI database
yamunaK13
 
PPTX
How to Manage Leads in Odoo 18 CRM - Odoo Slides
Celine George
 
PPTX
Five Point Someone – Chetan Bhagat | Book Summary & Analysis by Bhupesh Kushwaha
Bhupesh Kushwaha
 
PPTX
CDH. pptx
AneetaSharma15
 
PPTX
Applications of matrices In Real Life_20250724_091307_0000.pptx
gehlotkrish03
 
DOCX
Modul Ajar Deep Learning Bahasa Inggris Kelas 11 Terbaru 2025
wahyurestu63
 
PPTX
HISTORY COLLECTION FOR PSYCHIATRIC PATIENTS.pptx
PoojaSen20
 
PPTX
Information Texts_Infographic on Forgetting Curve.pptx
Tata Sevilla
 
PPTX
An introduction to Dialogue writing.pptx
drsiddhantnagine
 
PDF
The-Invisible-Living-World-Beyond-Our-Naked-Eye chapter 2.pdf/8th science cur...
Sandeep Swamy
 
PPTX
Basics and rules of probability with real-life uses
ravatkaran694
 
PDF
Health-The-Ultimate-Treasure (1).pdf/8th class science curiosity /samyans edu...
Sandeep Swamy
 
PPTX
Artificial-Intelligence-in-Drug-Discovery by R D Jawarkar.pptx
Rahul Jawarkar
 
PDF
Review of Related Literature & Studies.pdf
Thelma Villaflores
 
PPTX
INTESTINALPARASITES OR WORM INFESTATIONS.pptx
PRADEEP ABOTHU
 
PPTX
Python-Application-in-Drug-Design by R D Jawarkar.pptx
Rahul Jawarkar
 
PDF
Antianginal agents, Definition, Classification, MOA.pdf
Prerana Jadhav
 
PPTX
Command Palatte in Odoo 18.1 Spreadsheet - Odoo Slides
Celine George
 
PPTX
How to Apply for a Job From Odoo 18 Website
Celine George
 
PPTX
Cleaning Validation Ppt Pharmaceutical validation
Ms. Ashatai Patil
 
Virus sequence retrieval from NCBI database
yamunaK13
 
How to Manage Leads in Odoo 18 CRM - Odoo Slides
Celine George
 
Five Point Someone – Chetan Bhagat | Book Summary & Analysis by Bhupesh Kushwaha
Bhupesh Kushwaha
 
CDH. pptx
AneetaSharma15
 
Applications of matrices In Real Life_20250724_091307_0000.pptx
gehlotkrish03
 
Modul Ajar Deep Learning Bahasa Inggris Kelas 11 Terbaru 2025
wahyurestu63
 
HISTORY COLLECTION FOR PSYCHIATRIC PATIENTS.pptx
PoojaSen20
 
Information Texts_Infographic on Forgetting Curve.pptx
Tata Sevilla
 
An introduction to Dialogue writing.pptx
drsiddhantnagine
 
The-Invisible-Living-World-Beyond-Our-Naked-Eye chapter 2.pdf/8th science cur...
Sandeep Swamy
 
Basics and rules of probability with real-life uses
ravatkaran694
 
Health-The-Ultimate-Treasure (1).pdf/8th class science curiosity /samyans edu...
Sandeep Swamy
 
Artificial-Intelligence-in-Drug-Discovery by R D Jawarkar.pptx
Rahul Jawarkar
 
Review of Related Literature & Studies.pdf
Thelma Villaflores
 
INTESTINALPARASITES OR WORM INFESTATIONS.pptx
PRADEEP ABOTHU
 
Python-Application-in-Drug-Design by R D Jawarkar.pptx
Rahul Jawarkar
 
Antianginal agents, Definition, Classification, MOA.pdf
Prerana Jadhav
 
Command Palatte in Odoo 18.1 Spreadsheet - Odoo Slides
Celine George
 
How to Apply for a Job From Odoo 18 Website
Celine George
 
Cleaning Validation Ppt Pharmaceutical validation
Ms. Ashatai Patil
 

Bn 1023 demo network security