Distributed Networks Distributed Networks






Network Security and Firewalls  «Prev  Next»
Lesson 2 Network Security Key Course Features
Objective Explore key course features.
Prerequisites
Prior to taking this course, students should understand operating systems and networking principles.
Platform support
You can take this course on Windows, Macintosh, or Unix platforms.
MouseOver Toolbar
Whenever you see this graphic within the course, a jQuery toolbar explains or dissects some element of network security and firewalls.
Move your mouse cursor over the elements of the image outlined in red to display an explanation of the graphic.
SlideShow Widget
A SlideShow presents a series of images you can flip through, either forward or backward.
In this course, slideshows will be used to explain concepts related to network security and firewalls.
Glossary
Throughout this course, you will have the opportunity to review definitions of key terms.
The glossary for the course can be reached through the following link Network Security Firewalls - Glossary.
The terms appear throughout the course in the lesson text. If at any time you require to look up a keyword, this can be done by using the Search textbox located at the top.


Network security consists of
  1. the provisions made in an underlying computer network infrastructure,
  2. policies adopted by the network administrator to protect the network,
  3. and the network-accessible resources
from unauthorized access and continuous monitoring.

Network Security
Network security consists of
  1. the provisions made in an underlying computer network infrastructure,
  2. policies adopted by the network administrator to protect the network and
  3. the network-accessible resources from unauthorized access, and
  4. the effectiveness (or lack) of these measures combined together.
Network SecurityNetwork Security
Distributednetworks are
  1. based on autonomous entities,
  2. can be integrated with other types of network elements, and
  3. are more robust than centralized networks.
For better utilization of an intelligent network, this kind of heterogeneous setup requires a unified IP-based management.