Were you searching to download Computer Network Security PDF? Well, you are at right place. I have given the download link of the pdf below but before that please go through the table of content of the pdf to know what topics are covered in that pdf.

Download Computer Network Security PDF

Book 1: Network Security Tutorial

Network Security Tutorial  pdf

Table of content

  • Why Security?
  • Internet Evolution
  • Breach Sources
  • Types of Security
  • Goals of Information Security
  • Access Control
  • Authentication
  • Examples of Tokens
  • Trusted Network
  • Strong Authentication
  • Two-factor Authentication
  • Authorization
  • Authentication vs. Authorization
  • Authorization Concepts
  • Single Sign On
  • Types of Access Control
  • Accountability
  • Integrity
  • Risk, Threat and Vulnerability
  • Vulnerability
  • Threat

Also Download: Introduction to Computer Network PDF

  • Risk Management vs. Cost of Security
  • Attack Sources
  • General Threats
  • Reconnaissance Attack
  • Man-in-the-Middle Attack
  • Session Hijacking
  • Denial of Service (DoS) Attack
  • Layered Security &
    Attack Mitigation
  • Attacks on Different Layers
  • Layer 2 Attacks
  • ARP Spoofing 1
  • MAC Flooding
  • DHCP Attacks
  • DHCP Attack Types
  • Layer 3 Attacks
  • Ping Flood
  • Mitigating Sniffing Attacks
  • Routing Attacks
  • TCP Attacks
  • TCP Attacks
  • Application Layer Attacks
  • Application Layer Attacks
  • Application Layer DDoS: Slowloris
  • Web Application Security Risks
  • DNS Changer
  • Rogue DNS Servers
  • Top DNS Changer Infections
  • DNS Vulnerabilities
  • DNS Cache Poisoning
  • DNS Amplification
  • Common Types of Attack
  • Wireless Attacks
  • Man in the Middle Attacks (Wireless)
  • Botnet
  • Password Cracking
  • Pharming and Phishing
  • Security on Different Layers
  • Link-Layer Security
  • Layer 2 Forwarding Protocol
  • Point to Point Tunneling Protocol
  • Layer 2 Tunneling Protocol
  • PPPoE
  • Transport Layer Security
  • SSL Handshake
  • Advantages of SSL
  • Applications Using SSL/TLS
  • Secure Shell Protocol (SSH)
  • Application Layer Security
  • Pretty Good Privacy (PGP)
  • MIME
  • Securing the Nameserver
  • Cryptography
  • Crypto Core
  • History: Ciphers
  • How to Break a Substitution Cipher
  • Transposition Cipher
  • History: Rotor Machines (1870-1943)
  • Modern Crypto Algorithms
  • Encryption
  • Encryption and Decryption
  • Symmetric Key Algorithm
  • Symmetric Encryption
  • Symmetric Key Algorithm
  • Block and Stream Cipher
  • Block Cipher
  • Stream Cipher
  • Data Encryption Standard (DES)
  • DES: Illustration
  • Triple DES
  • 3DES: Illustration
  • Advanced Encryption Standard (AES)
  • Rivest Cipher
  • RC4
  • Block Cipher Modes
  • Electronic Codebook (ECB)
  • Ciphertext Block Chaining (CBC)
  • Cipher Feedback (CFB)
  • Output Feedback (OFB)
  • Selecting a Block Cipher Mode
  • Asymmetric Key Algorithm
  • Asymmetric Encryption
  • Asymmetric Key Algorithm
  • Symmetric vs. Asymmetric Key
  • Hash Functions
  • Digital Signature
  • Digital Signature Process
  • Signature Verification Process
  • Public Key Infrastructure
  • Functions of a PKI
  • Public Key Infrastructure
  • Components of a PKI
  • Certificates
  • Digital Certificate
  • X.509 Certificate Usage
  • Every certificate contains…
  • Certificate Authority
  • Certificate Revocation Lists
  • Resource Registration
  • What is the APNIC Database?
  • Whois Database Query – Clients
  • Object Types
  • Database Object
  • Inter-Related Objects
  • New Members
  • Inetnum / Inet6num Objects
  • Whois – Inet6num Example
  • Person Object
  • What is a ‘nic-hdl’?
  • How a Role Object Works
  • Replacing Contacts in the DB
    – Using Person Objects
  • Replacing Contacts in the DB
    – Using a Role Object
  • Whois – Role vs Person Objects
  • IRT Object
  • Database Protection – Maintainers
  • Database Protection
  • Database Protection
    Maintainer Object
  • Maintainer Hierarchy Diagram
  • Customer Privacy
  • What Needs to be Visible?
  • X.509 Certificate + 3779 Ext
  • Resource Certification
  • Terminologies
  • Resource Certification Benefits
  • Resource Public Key Infrastructure
  • Route Origin Attestations (ROAs)
  • More Info on RPKI
  • IP Security (IPSec)
  • Virtual Private Network
  • VPN Implementations
  • VPN Protocols
  • Advantages of VPN
  • Disadvantages of VPN
  • IPsec
  • IPsec Standards
  • Benefits of IPsec
  • Benefits of IPsec
  • Different Layers of Encryption
  • IPsec Modes
  • Tunnel vs. Transport Mode IPsec
  • IPsec Architecture
  • Security Associations (SA)
  • Security Associations
  • Security Parameter Index (SPI)
  • How to Set Up SA
  • Selectors
  • Authentication Header (AH)
  • AH Header Format
  • Encapsulating Security Payload (ESP)
  • ESP Header Format
  • Packet Format Alteration for AH
    Transport Mode
  • Packet Format Alteration for ESP
    Transport Mode
  • Packet Format Alteration for AH
    Tunnel Mode
  • Packet Format Alteration for ESP
    Tunnel Mode
  • Internet Key Exchange (IKE)
  • IKE Modes
  • Overview of IKE
  • ISAKMP Header Format
  • ISAKMP Message Format
  • IKE Phase 1 (Main Mode)
  • KE Phase 1 (Aggressive Mode)
  • KE Phase 2 (Quick Mode)
  • IPSec Best Practices
  • Configuring IPSec
  • IPSec Layout
  • Router Configuration

Click on the link below to Introduction to Computer Networking PDF:

Download PDF

Book 2

Network Security Basics

Introduction to Network security

Table of content

Introduction to Network security

  • Security Overview
  • Defining Basic Security Concepts
  • Knowledge is Power
  • Think Like a Thief
  • The Intrusion Triangle
  • Removing Intrusion Opportunities
  • Security Terminology

Addressing Security Objectives

  • Protecting the Servers
  • Keeping Workstations Secure
  • Protecting Network Devices
  • Securing the Cable
  • Safely Going Wireless
  • Have Laptop, Will Travel
  • The Paper Chase
  • Removable Storage Risks
  • Physical Security Summary

Preventing Accidental Compromise of Data

  • Know Your Users
  • Educate Your Users

Preventing Intentional Internal
Security Breaches

  • Hiring and Human Resource Policies
  • Detecting Internal Breaches
  • Preventing Intentional Internal Breaches

Preventing Unauthorized External Intrusions

  • External Intruders with Internal Access
  • Tactical Planning

Recognizing Network Security Threats

  • Understanding Intruder Motivations
  • Recreational Hackers
  • Profi t-motivated Hackers
  • Vengeful Hackers
  • Hybrid Hackers

Classifying Specific Types of Attacks

  • Social engineering attacks
  • What is social engineering?
  • Denial of Service (DOS) Attacks
  • Distributed Denial of Service attacks
  • DNS DOS attack
  • SYN attack/LAND attack
  • Ping of Death
  • Teardrop
  • Ping Flood (ICMP flood)
  • SMURF attack
  • UDP bomb or UDP flood
  • UDP Snork attack
  • WinNuke (Windows out-of-band attack)
  • Mail bomb attack
  • Scanning and Spoofing
  • IP half scan attack
  • IP Spoofing
  • Source Routing attack
  • Other protocol exploits
  • System and software exploits
  • Trojans, viruses and worms
  • Viruses

Also Download: Introduction to Computer Network PDF

Designing a Comprehensive Security Plan

  • Evaluating Security Needs
  • Assessing the type of business
  • Assessing the type of data
  • Assessing the network connections
  • Assessing management philosophy
  • Understanding Security Ratings
  • Legal Considerations
  • Designating Responsibility for Network Security
  • Responsibility for Developing the Security Plan
    and Policies
  • Responsibility for Implementing and Enforcing the
    Security Plan and Policies

Designing the Corporate Security Policy

  • Developing an Effective Password Policy
  • Password Length and Complexity
  • Who creates the password?
  • Password Change Policy
  • Summary of Best Password Practices
  • Educating Network Users on Security Issues

Click on the link below to Computer Network Security PDF:

Download PDF

Book 3

Network Security

Network Security pdf

Table of Content

Network Security Components

ISP Example

Enterprise Example

Current Threats and
Attack Methods

Attack Trends

Vulnerability Exploit Cycle

Increasingly Serious Impacts

Evolving Dependence

The Community’s Vulnerability

Unauthorized Use

Sophisticated attacks + Dependency + Vulnerability

Classes of Attacks

Reconnaissance Methods

Network Sniffers

ISP Example

Enterprise Example

This is the table of content of Computer Network Security PDF

Access Methods

Access Methods Access Methods cont’d

IP Packet

IP: Packet Format

IP Spoofing IP Spoofing

IP: Normal Routing

IP: Source Routing

IP Unwanted Routing

IP Unwanted Routing (Cont.)

IP Spoofing Using Source

Transport Control Protocol

TCP connection establishment

TCP blind spoofing

TCP session hijacking

Denial of Service Methods

IP Normal Fragmentation

IP Normal Fragmentation (Cont.)

IP Normal Reassembly

This is the table of content of Computer Network Security PDF

Also Download: Basic Network Security Pdf Download

IP Reassembly Attack

SYN attack

SMURF Attack

DDoS Step 1: Find Vulnerable Hosts

DDoS Step 2: Install Software on DDoS Step
Masters and Agents

DDoS Step 3: Launch the attack

Security Policy 

Why a Site Security Policy?

Security Policy Topics

Site Security Policy Resources

Policies Affecting  Your

Securing Your Network

Securing Your Network

Securing Your Operational

Secure Initial System Setup – 1

Domain Name Servers

Protecting System Password  Information

Manage Networks Securely

Click on the link below to Computer Network Security PDF:

Download PDF