3.3 Develop security protocols for a logical network that respond to the threats identified

  
🔴 LIVE EXPERT
  113 Orders

Unit 4IT05: Logical IT Networking 

Unit code: H/617/6696
Level: 4

NOTE: Kindly share your UPDATED exam paper to the LIVE EXPERT with an updated Case Study (if any)

Unit Aims
This unit aims to provide learners with knowledge of logical networking. It covers Transmission Control Protocol (TCP) / Internet Protocol (IP), Local Area Networks (LAN) and Wide Area Networking (WAN), including IP address and subnetting.

Learning Outcomes and Assessment Criteria

Learning Outcomes: To achieve this unit, the learner must be able to:

Assessment Criteria: Assessment of these outcomes demonstrates the learner can:

1. Understand logical networking

1.1 Analyse the nature and features of a logical network

1.2 Analyse the differences between network architectures

1.3 Analyse the functionality of each layer in an OSI network model

1.4 Define correctly an IP address and subnet masks

2. Understand the components and interfaces between different logical networking attributes

2.1 Analyse the rules of network protocols and communications

2.2 Analyse the differences within the physical layer

2.3 Analyse the requirements of WAN and LAN topologies and a data link protocol

2.4 Analyse the differences within the network layer and transport layer

2.5 Establish network design considerations

3. Understand the security requirements of a logical network

3.1 Analyse the security requirements of a network

3.2 Identify the threats to a network

3.3 Develop security protocols for a logical network that respond to the threats identified

Indicative Content

  • Exploring the network
  • Network protocols and communications
  • Network access
  • Network layer
  • Transport layer
  • IP addressing
  • Subnetting IP network
  • Network design and consideration
  • Device factors
  • Designing network
  • Scaling network
  • Security threat
  • Physical threat
  • Primary vulnerabilities
  • Network attacks
  • Mitigating network attacks
  • SSH configuration
  • Backup and restore configuration

Recommended Text

Lowe D (2018), Networking All-in-One for Dummies 7th Edition, John Wiley & Sons, New Jersey Cisco e-Learning portal

Petzold C (2000), The Hidden Language of Computer Hardware, Microsoft Press, Washington


The quoted price covers up to 3000 words. For custom requirements Live Chat or Whatsapp Click Here



                             

Email: [email protected]

100% Plagiarism Free & Custom Written, Tailored to your instructions

Our Giveaways

Plagiarism Report

for د.إ50 Free

Formatting

for د.إ32 Free

Title page

for د.إ20 Free

Bibliography

for د.إ36 Free

Outline

for د.إ19 Free

Limitless Amendments

for د.إ38 Free

Get all these features for
د.إ195.00 FREE

ORDER NOW
assignment bank giveaways

Our Ratings