
A) Security history/background
B) Secure network design
-Firewalls
-Hacker prevention/
intruder detection
-Data encryption
C) SSL secure socket layer) data transfer technologies
D) Antivirus
-Design
-Configuration
-Installation
-Monitoring
E) VPN (virtual private networking)
F) Secure email
|