DispersedNet
SiteMap
Network Admin
Unix Admin
System Admin
Network Security
Securing Resources
«Prev
Next»
Network Security Overview
Security Standards
Security Characteristics
Security System Threat
Effective Security Systems
Planning Security Policy
System Security Policy
Creating Policy
Organizational Training
Security Standards
Security Basics - Quiz
Effective Security Structure
Important Security Elements
Security Services Standards
Encrypting Decrypting Data
Authentication Methods - Quiz
Securing Protocol Layers
TCP/IP Network
Transport Layer
SYN Flood Attack
Packet Construction
Protocol Layers - Quiz
Securing Resources
OS Security
Protecting TCP/IP
OS Security Quiz
Securing Resources Services
Firewalls in Depth
What is Firewall
Packet Filters
Circuit Level Gateways
Application Gateway
Bastion Host Firewall
Common Firewall Designs
Strategies Goals
Firewall Types
Protecting TCP/IP Services Exercise - Result
Securing TCP/IP resources
Objective:
Locate documentation for securing TCP/IP and network resources.
Exercise scoring
This exercise is worth five points and is auto-scored.
There are no answers to be submitted in this exercise.
Instructions
In this exercise you will locate Windows NT and Solaris documentation for securing TCP/IP and network resources.
To locate Windows NT security information:
Go to the Microsoft Windows
Microsoft - Security
Page.
Scroll down the page to review all of the security information available.
Visit the following page for the
Important elements in Security
page
To locate Solaris security information:
Go to the
Oracle Cloud Security
to learn about Oracle Cloud Security.
When you have completed this exercise, click the
Submit
button to finish.