Table of Contents

  1. Introduction
  2. Security threats
    1. Hackers/crackers
    2. Hacking - Why and How
    3. Client Applications
    4. Internet Servers
    5. Cyber crime
    6. Types of Attack
  3. Protection Methods
    1. Browser settings
    2. How to change Settings
    3. E-mail filters
    4. Anti-Malware Software
    5. Security Zones
    6. Public and Private
    7. Demilitarised Zone (DMZ)
    8. Implementing a DMZ
    9. Intranets and Extranets
    10. VPN Activity
    11. Intrusion Detection Systems
  4. Summary
  5. SAQ 1
    1. SAQ 2
    2. SAQ 3