Topic 1: Virtual Private Networks
What did this technology replace? What are the different types of VPNs, and under what circumstance would you use each?
Topic 2: NAT
Discuss the considerations of NAT. How has it allowed the continued use of IPv4? How is it different from a firewall? How is it the same as a firewall? What is a state table? How can you access resources publicly behind a NAT server?
Unit 9
Topic 1: Intrusion Systems
Discuss the differences between network intrusion systems and host-based systems, detection versus prevention systems, and the different ways these systems can detect malware. Explain how a system could use cryptographic hashes to detect a compromise.
Topic 2: Cloud Considerations
What are the different types of cloud computing services? What are the issues with data ownership in the cloud? How does vulnerability testing differ based on the cloud model used?
Unit 10
Topic 1: Importance of Cybersecurity Policies
You have a friend, relative, or coworker who does not understand your enthusiasm for cybersecurity policies or the importance of cybersecurity polices. How would you convince them of the importance of having spelled-out, specific cybersecurity polices for everyone and everything in an organization?
