| Textbook Title | EBook |
|---|---|
| An Introduction to Computer Networks | Read eBook |
| Introduction to Networks Security | Read eBook |
| Topic | Textbook Section | Web Resources |
|---|---|---|
| Introduction to Information Security | TBD | Introduction to Information Security(OERCommons) |
| Types of Security Challenges | TBD | Types of Security Challenges (SecurityTrails) |
| Access Control Models | TBD | Access Control Models (Twingate.com) |
| Illustrate Authentication and Authorization Techniques | TBD | Illustrate Authentication and Authorization Techniques (BU TechWeb) |
| Define Malware | TBD | Define Malware (w3schools) |
| Social Engineering Attacks Techniques and Prevention | TBD | Social Engineering Attacks Techniques and Prevention (Imperva) Social Engineering Attacks Techniques and Prevention (JavaTpoint) |
| Difference between Physical Security and Hardware Security | TBD | Basic Utilities (Embedded) |
| Definition of Denial of Service and DNS attacks | TBD | Denial of Service (Cloudflare) DNS attacks (Bluecat) |
Define Firewalls and VPNS | TBD | Firewalls (w3schools) VPNs (Kaspersky) |
| Password Attacks, Web Application Attaks, Wireless Security Attacks and Network Attacks | TBD | Password Attacks (w3schools) Web Application Attacks (w3schools) Wireless Security Attacks (w3schools) Network Attacks (w3schools) |
| Illustrate Vulnerabilities and Solutions | TBD | Illustrate Vulnerabilities and Solutions (TechTarget) |
| Penetration Testing and Social Ingineering | TBD | Penetration Testing and Social Ingineering (w3schools) |
| Title | Video Resource |
|---|---|
| Network Security: Basic Concepts | Watch Video |
| Introduction to Cryptography and Network Security | Watch Video |
| CIA Triad | Watch Video |
| The OSI Security Architecture | Watch Video |
| Security Attacks | Watch Video |
| Network Security Model | Watch Video |
| Cryptography | Watch Video |
| Cryptography – Key Terms | Watch Video |
| Brute Force Attack | Watch Video |
| Classical Encryption Techniques | Watch Video |
| Access Control Models (DAC, Non-DAC, IBAC, RBAC, RuBAC, TBAC, ABAC, MAC, LBAC) | Watch Video |
| Network Security Tools | Go to Website Download |
|---|---|
| Wireshark | Go to Site |
| Snort | Go to Site |
| Metasploit | Go to Site |
Open Educational Resources (OER) are teaching and learning materials that you may freely use and reuse at no cost.