Basics of Zero-Knowledge Proofs
For Privacy-Preserving Online Communications
With ever more of our commercial and personal lives occurring electronically, network security is vital. When networks don't have secure foundations, malware steals from us, invades our privacy, and threatens our safety. This guide uncovers the technology behind network security: its strengths, weaknesses, past, and future.
Explore similar courses.
For Privacy-Preserving Online Communications
Prepare for any certification exam with this essential course and learn how network communication really works
Your first step into the world of modern network security: fully updated for today's threats, defenses, tools, equipment, and techniques! For everyone who wants to learn about network security and build a career in this crucial, fast-growing profession Updated, easy-to-understand introductions to hackers, attacks, security tools/technologies, networking equipment, wireless security, and more Authoritative, step-by-step, best-practice guidance on preparing for and reacting to security incidents T
Expert guidance on designing secure networks Understand security best practices and how to take advantage of the networking gear you already have Review designs for campus, edge, and teleworker networks of varying sizes Learn design considerations for device hardening, Layer 2 and Layer 3 security issues, denial of service, IPsec VPNs, and network identity Understand security design considerations for common applications such as DNS, mail, and web Identify the key security roles and placement is
Get the latest on new courses, sales, learning tips, site updates and community events.