Course for the Bachelor's Degree in Computer Science @ Department of Mathematics and Informatics
Computer Networks: Monitoring and Security (Course)
Slide 01 - Summary
Slide 02 - What are you trying to protect?
Slide 03 - How can you protect your site?
Slide 04 - What is a Internet Firewall?
Slide 05 - What can a Firewall do?
Slide 06 - What cant a Firewall do?
Slide 07 - Fail-Safe Stance
Slide 08 - Firewall Design Packet Filtering (1)
Slide 09 - Firewall Design Packet Filtering (2)
Slide 10 - Firewall Design Packet Filtering (3)
Slide 11 - Firewall Design Proxy Services (1)
Slide 12 - Firewall Design Proxy Services (2)
Slide 13 - Firewall Design Proxy Services (3)
Slide 14 - Firewall Architectures Dual-Homed host architecture
Slide 15 - Firewall Architecture Screened host architecture (1)
Slide 16 - Firewall Architecture Screened host architecture (2)
Slide 17 - Firewall Architecture Screened subnet architecture (1)
Slide 18 - Firewall Architecture Screened subnet architecture (2)
Slide 19 - Another Layers of Security Perimeter Network (DMZ)
Slide 20 - Another Layers of Security Bastion Host
Slide 21 - Another Layers of Security Interior Router
Slide 22 - Another Layers of Security Exterior Router
Slide 23 - TCP/IP Fundamentals (1)
Slide 24 - TCP/IP Fundamentals (2)
Slide 25 - TCP/IP Fundamentals (3)
Slide 26 - TCP/IP Fundamentals (4)
Slide 27 - TCP/IP Fundamentals (5)
Slide 28 - Internet Services (1)
Slide 29 - Internet Services (2)
Slide 30 - Yet Another Firewall Classification (1)
Slide 31 - Yet Another Firewall Classification (2)
Slide 32 - Linux Netfilter Suite
Slide 33 - IpTables (1)
Slide 34 - IpTables (2)
Slide 35 - IpTables (3)
Slide 36 - IpTables (4)
Slide 37 - IpTables (5)
Slide 38 - IpTables examples (1)
Slide 39 - IpTables examples (2)
Slide 40 - Monitoring (1)
Slide 41 - Monitoring (2)
Slide 42 - Monitoring (3)
Slide 43 - Monitoring (4)
Slide 44 - Monitoring (5)
Slide 45 - Practice
Slide 46 - References
Examples - Click Here