Course for the Bachelor's Degree in Computer Science @ Department of Mathematics and Informatics

Computer Networks: Monitoring and Security (Course)

Slide 01 - Summary Slide 02 - What are you trying to protect? Slide 03 - How can you protect your site? Slide 04 - What is a Internet Firewall? Slide 05 - What can a Firewall do? Slide 06 - What can’t a Firewall do? Slide 07 - Fail-Safe Stance Slide 08 - Firewall Design – Packet Filtering (1) Slide 09 - Firewall Design – Packet Filtering (2) Slide 10 - Firewall Design – Packet Filtering (3) Slide 11 - Firewall Design – Proxy Services (1) Slide 12 - Firewall Design – Proxy Services (2) Slide 13 - Firewall Design – Proxy Services (3) Slide 14 - Firewall Architectures – Dual-Homed host architecture Slide 15 - Firewall Architecture – Screened host architecture (1) Slide 16 - Firewall Architecture – Screened host architecture (2) Slide 17 - Firewall Architecture – Screened subnet architecture (1) Slide 18 - Firewall Architecture – Screened subnet architecture (2) Slide 19 - Another Layers of Security – Perimeter Network (DMZ) Slide 20 - Another Layers of Security – Bastion Host Slide 21 - Another Layers of Security – Interior Router Slide 22 - Another Layers of Security – Exterior Router Slide 23 - TCP/IP Fundamentals (1) Slide 24 - TCP/IP Fundamentals (2) Slide 25 - TCP/IP Fundamentals (3) Slide 26 - TCP/IP Fundamentals (4) Slide 27 - TCP/IP Fundamentals (5) Slide 28 - Internet Services (1) Slide 29 - Internet Services (2) Slide 30 - Yet Another Firewall Classification (1) Slide 31 - Yet Another Firewall Classification (2) Slide 32 - Linux Netfilter Suite Slide 33 - IpTables (1) Slide 34 - IpTables (2) Slide 35 - IpTables (3) Slide 36 - IpTables (4) Slide 37 - IpTables (5) Slide 38 - IpTables examples (1) Slide 39 - IpTables examples (2) Slide 40 - Monitoring (1) Slide 41 - Monitoring (2) Slide 42 - Monitoring (3) Slide 43 - Monitoring (4) Slide 44 - Monitoring (5) Slide 45 - Practice Slide 46 - References
Examples - Click Here