Here you will get the material for computer IT and Computer security related courses and tutorials . The materials for which you will get the PDF, DOC, PPT, RAR and ZIP files are network security and extended local wifi, cracking, hacking and many others. As these tutorials are included in many of the academic schedules, you will need to get detailed information on them. As it will not possible for you to browse the web for every small topic, you can go for downloading the PDF files for having easy access to the information. Also tutorials, corrected exercises and practical work will make it easy for you to have a clear understanding of every topic.

Beginner Courses:

CyberSecurityTip_Icon   Cyber-safety Basics

  • Introduction
  • What is Cyber-safety?
  • Cyber-safety Threats
  • Consequences of Inaction
  • Cyber-safety Actions
  • Cyber-safety at Home and Work
  • Compus Cyber-safety Services

Securing-Wi-Fi-Network  Wi-Fi security – WEP, WPA and WPA2

Wi-Fi (Wireless Fidelity) is one of today’s leading wireless technologies, with Wi-Fi support being integrated into more and more devices: laptops, PDAs, mobile phones. However, one configuration aspect all too often goes unnoticed: security. Let’s have a closer look at the level of security of encryption methods used in modern Wi-Fi implementations.

What you will learn…

  • the weaknesses of WEP encryption,
  • a global overview of the 802.11i standard and its  commercial  implementations:  WPA  and WPA2,
  • the basics of 802.1x,
  • the potential weaknesses of WPA and WPA2.

What you should know…

  • the basics of the TCP/IP and Wi-Fi protocols,
  • you should have a basic knowledge of cryptography.

Content

  • Benefits and Risks of a Wireless Network 
  • How to Secure a Wireless Network
    • Turn Encryption On
    • Turn the Firewall On
    • Change Default Passwords
    • Change the Default Name of the Network
    • Turn Network Name Broadcasting Off
    • Use the MAC Address Filter
  • Additional Wi-Fi Safety Tips
  • Links to Additional Wi-Fi Security Resources

pc-security An Introduction to Computer Security

Table of Contents

  • Introduction and overview
    •  introduction
    •  elements of computer security
    •  roles and responsibilities
    •  common threats: a brief overview
  • Management controls
    •  computer security policy
    •  computer security program management
    •  computer security risk management
    •  security and planning in the computer system life cycle
    •  assurance
  • Operational controls
    •  personnel/user issues
    •  preparing for contingencies and disasters
    •  computer security incident handling
    •  awareness, training, and education
    •  security considerations in computer support and operations
    •  physical and environmental security
  • Technical controls
    •  identification and authentication
    •  logical access control
    •  audit trails
    •  cryptography

…………….webpage is under construction

underconstruction

Leave a comment

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s