Академический Документы
Профессиональный Документы
Культура Документы
Orhan Gemikonakli
Unix
Brief History of Unix, Timeline, and Varieties Benefits of Unix, Linux Unix Operating Environment
UNIX
Unix File System Unix Commands
Syntax Examples
Directory and File Management Using GNU Network Object Model Environment (GNOME)
Understand the hierarchical addressing of devices and how this allows communication between networks
Understand the fundamentals of routes, next hop addresses and packet forwarding to a destination network
Process manipulation functions: e.g. fork() etc. UNIX manages tasks using processes
Process states running, blocked, ready, suspend etc.
Process can spawn a subprocess, thus creating a process hierarchy with parent / child relationships Some simple commands, such as cd, are executed by the shell itself and do not create a separate process Interprocess communication (IPC): pipes, sockets
Security
Security Risk Analysis
Security Mechanisms
Security Policies Security Examples
Firewalls: Internal, External Distributed Host Security Security Breaches and Controls
Practical Security
Firewalls, IDS, VPN
Security
Computer and Network Security Requirements
Security Threats
Protection Intruders Malicious Software Trusted Systems
Penetration Testing
Describe a Penetration Test
Cryptography
Describe key events in cryptography history
More on Cryptography
Digital signatures
Key Management
Public key management Private key management
Cryptography Standards
Wireless Network Cryptography
Virtual machines
Summary
Revise all topics covered for a good grade