In this session, I will cover the following topics by applying what you have learned in the first of three-part webinar series devoted to the subject of Protecting Your Network by using Cryptography to solve some IT issues.
Outline:
- Applying Cryptography to OSI Model
- Securing Services with the use of Cryptography
- Web Servers
- Mail Servers
- Right Managements for protecting data
- Network Traffic
- VPN in the following modes
- Gateway-to-Gateway VPN
- Host-to-Gateway VPN
- Securing Network traffic with IPsec
- Wireless Weaknesses
- Securing wireless with Cryptography
- We will explore WEP, WPA, and WPA2
- Steganography
To attend this session on February 23, 2011 Time – Noon – 1 PM ET
Click Here
Part Three: will be Disaster Recovery – April 27, 2011
Technorati Tags: Security Webinar Securing Communications,Security Webinars