Security Webinar Securing Communications

In this session, I will cover the following topics by applying what you have learned in the first of three-part webinar series devoted to the subject of Protecting Your Network by using Cryptography to solve some IT issues.


  • Applying Cryptography to OSI Model
  • Securing Services with the use of Cryptography
    • Web Servers
    • Mail Servers
  • Right Managements for protecting data
  • Network Traffic
  • VPN in the following modes
    • Gateway-to-Gateway VPN
    • Host-to-Gateway VPN
  • Securing Network traffic with IPsec
  • Wireless Weaknesses
  • Securing wireless with Cryptography
    • We will explore WEP, WPA, and WPA2
  • Steganography

To attend this session on February 23, 2011 Time – Noon – 1 PM ET

Click Here

Part Three:  will be Disaster Recovery – April 27, 2011