Once the monitoring module, a student will be able to:
- perform security audits of network infrastructure companies
- to provide security solutions
- install or to install these solutions
Sommary :
1. Introduction
2. Router Configuration
3. Cryptography
4. Secure Connections
5. Firewalling
6...