After studying this course, you should be able to:
identify some of the factors driving the need for network security
identify and classify particular examples of attacks
define the terms vulnerability, threat and attack
identify physical points of vulnerability in simple networks
compare and contrast symmetric and asymmetric encryption systems and their vulnerability to attack, and explain the characteristics of hybrid systems.