Network security course


 
Thread Tools Search this Thread
Special Forums Cybersecurity Network security course
# 1  
Old 08-16-2010
Network security course

Hi

I was wondering if someone could give some tips about network security postgraduate courses and/or certifications .

I know that is a generic question and a wide area, but that's the problem, the net is full of books, courses, or whatever.
My goal is to find a good course (or book) that face the network security issue, I'd like just get a feedback from someone. Smilie

Thanks a lot
Login or Register to Ask a Question

Previous Thread | Next Thread

6 More Discussions You Might Find Interesting

1. What is on Your Mind?

Career in Networking & Network Security

Hii i want to make career in networking and i m new in this field could u plz help me what should i do (2 Replies)
Discussion started by: pawan_kumar
2 Replies

2. UNIX for Advanced & Expert Users

Network Shell Script & Blade Logic & Network Security

I am going to take up a position in Data & Network Security. I would need to write network shell scripts doing the following task: Going to around 2000 servers and findout which groups has access to each servers and which ids are there in each group that has access. I need to implement... (1 Reply)
Discussion started by: pinnacle
1 Replies

3. Shell Programming and Scripting

NIS, Network security

Hi, I am about to take up task of shell scripting in Network Security. Just started on job. But everything looks new NIS etc.. I tried googling to find systematic explanation of network security terms and how to script for that. But was unable to find. Could anyone of you please direct me to... (1 Reply)
Discussion started by: tostay2003
1 Replies

4. Cybersecurity

Network Security

Hi, I'm currently in a Technical Writing class and I decided to do a report on network security. I need a primary source for this and decided that I would poll you fine people on your prefrences in security related software to get said primary source. 1. What webserver would you consider to be... (1 Reply)
Discussion started by: TYLERofDOOM
1 Replies

5. Cybersecurity

Unix Network Security Admin

Hello peoples, I could really use some expert advice. Currently I am starting my curriculumn in CompSci. I am very interested in Unix, Shell Programming and Network Security. I would Like to work in Compusec/Infosec........fight system vulnerability for my future employer. What Cert would you... (3 Replies)
Discussion started by: pacman-iac
3 Replies

6. Cybersecurity

Security for network

hi there, i'm wondering what are the good books out there on internet security, PREFERABELY all topics roll into 1 book topics like firewall DES,3DES,SHA,SSL,CHAP,EAP SPAP,PAP,VPN,L2TP,PPTP,IAS,Kerboros,IPsec,PKI,digital signatures/certifcates,Denial of service,RADIUS,RAS,viruses,trojan... (2 Replies)
Discussion started by: happyfish
2 Replies
Login or Register to Ask a Question
gss_process_context_token(3)				     Library Functions Manual				      gss_process_context_token(3)

NAME
gss_process_context_token() - process a context to the security service SYNOPSIS
DESCRIPTION
The routine passes tokens generated by the routine to the security service. Usually, tokens are associated with either the context establishment or with per-message security services. If the tokens are associated with the context establishment, they are passed to the or routine. If the tokens are associated with the per-message security service, they are passed to the or routine. Tokens generated by the routine are passed by the routine to the security service for processing. Input Parameters context_handle Specifies the context handle on which the security service processes the token. input_token_buffer Specifies an opaque pointer to the first byte of the token to be processed. Output Parameters minor_status Returns a status code from the security mechanism. STATUS CODES
The following status codes can be returned: The routine was completed successfully. Consistency checks performed on the input_token parameter failed. The routine failed. See the minor_status parameter return value for more information. The supplied context handle did not refer to a valid context. AUTHOR
was developed by Sun Microsystems, Inc. SEE ALSO
gss_accept_sec_context(3), gss_delete_sec_context(3), gss_init_sec_context(3), gss_verify_mic(3), gss_unseal(3). The manpages for DCE-GSSAPI are included with the DCE-CoreTools product. To see those manpages add to gss_process_context_token(3)