Week 2 Securing Systems

Encryption. Wi-Fi. Wi-Fi Protected Access. HTTP. Machine-in-the-Middle Attacks. Packet Sniffing. Cookies. Session Hijacking. HTTPS. TLS. Certificate. X.509. Certificate Authority (CA). SSL Stripping. HSTS. VPN. SSH. Port. Port Scanning. Penetration Testing. Ethical Hacking. Firewall. IP Address. Deep Packet Inspection. Proxy. Malware. Virus. Worm. Botnet. Denial-of-Service Attack (DoS). Distributed Denial-of-Service Attack (DDoS). Antivirus. Automatice Updates. Zero-Day Attacks.