Key Technologies
- Firewall; Intrusion detection; Virtual Private Networks, Public Key Infrastructure, and cryptography;
- Perimeter Security and Vulnerability Assessment:
- Used tools such as ISS Internet Scanner, Nmap, Cheops and Nessus.
- Deploy security systems and devices (firewalls, intrusion sensors).
- Networks:
- Network security technology and practices - routers, firewalls, etc. Configuration, rules, ACLs, protocols, ports.
- General Security Functions - anti-virus/malicious, vulnerability management (scanners, security evaluation testing, penetration testing), intrusion controls, VPNs, encryption
- DNS
- VLAN
- IP network design
- Operating Systems
- Windows
- Web Server configuration, especially security managment of services, port, protocols
- Operating System secure configuration - services, ports, protocols, permissions/shares
0 Comments:
Post a Comment
<< Home