# Courses

- [Sec+](https://wiki.zacheller.dev/network-security/courses/sec+.md)
- [IBM Cybersecurity Analyst Professional Certificate](https://wiki.zacheller.dev/network-security/courses/ibm-cybersecurity-analyst-professional-certificate.md): Coursera Courses | Note: These courses have a lot of spelling errors.
- [ISCI CNSS Course](https://wiki.zacheller.dev/network-security/courses/isci-cnss-course.md)
- [Introduction to Network Security](https://wiki.zacheller.dev/network-security/courses/isci-cnss-course/introduction.md)
- [Network Basics](https://wiki.zacheller.dev/network-security/courses/isci-cnss-course/introduction/network-basics.md): A network is simply a way for machines / computers to communicate.
- [Basic Network Utilities](https://wiki.zacheller.dev/network-security/courses/isci-cnss-course/introduction/untitled-1.md)
- [The OSI Model](https://wiki.zacheller.dev/network-security/courses/isci-cnss-course/introduction/untitled-2.md): The Open Systems Interconnect (OSI) model describes how networks communicate.
- [Threat Classification](https://wiki.zacheller.dev/network-security/courses/isci-cnss-course/introduction/threat-classification.md)
- [Security Terminology](https://wiki.zacheller.dev/network-security/courses/isci-cnss-course/introduction/security-terminology.md)
- [Approaches of Network Security](https://wiki.zacheller.dev/network-security/courses/isci-cnss-course/introduction/approaches-of-network-security.md)
- [Law and Network Security](https://wiki.zacheller.dev/network-security/courses/isci-cnss-course/introduction/law-and-network-security.md)
- [Types of Attacks](https://wiki.zacheller.dev/network-security/courses/isci-cnss-course/types-of-attacks.md)
- [Denial of Service Attacks](https://wiki.zacheller.dev/network-security/courses/isci-cnss-course/types-of-attacks/denial-of-service-attacks.md)
- [Buffer Overflow Attacks](https://wiki.zacheller.dev/network-security/courses/isci-cnss-course/types-of-attacks/untitled.md)
- [IP Spoofing](https://wiki.zacheller.dev/network-security/courses/isci-cnss-course/types-of-attacks/ip-spoofing.md)
- [Session Hijacking](https://wiki.zacheller.dev/network-security/courses/isci-cnss-course/types-of-attacks/session-hijacking.md)
- [Fundamentals of Firewalls](https://wiki.zacheller.dev/network-security/courses/isci-cnss-course/fundamentals-of-firewalls.md)
- [What is a Firewall](https://wiki.zacheller.dev/network-security/courses/isci-cnss-course/fundamentals-of-firewalls/what-is-a-firewall.md)
- [Firewall Types](https://wiki.zacheller.dev/network-security/courses/isci-cnss-course/fundamentals-of-firewalls/firewall-types.md)
- [Firewall Implementation](https://wiki.zacheller.dev/network-security/courses/isci-cnss-course/fundamentals-of-firewalls/firewall-implementation.md)
- [Proxy Servers](https://wiki.zacheller.dev/network-security/courses/isci-cnss-course/fundamentals-of-firewalls/proxy-servers.md)
- [Windows Firewalls](https://wiki.zacheller.dev/network-security/courses/isci-cnss-course/fundamentals-of-firewalls/windows-firewalls.md)
- [Linux Firewalls](https://wiki.zacheller.dev/network-security/courses/isci-cnss-course/fundamentals-of-firewalls/linux-firewalls.md)
- [Intrusion-Detection Systems](https://wiki.zacheller.dev/network-security/courses/isci-cnss-course/intrusion-detection-systems.md)
- [IDS Concepts](https://wiki.zacheller.dev/network-security/courses/isci-cnss-course/intrusion-detection-systems/ids-concepts.md)
- [Components and Processes of IDS](https://wiki.zacheller.dev/network-security/courses/isci-cnss-course/intrusion-detection-systems/components-and-processes-of-ids.md)
- [Implementing IDS](https://wiki.zacheller.dev/network-security/courses/isci-cnss-course/intrusion-detection-systems/implementing-ids.md)
- [Honeypots](https://wiki.zacheller.dev/network-security/courses/isci-cnss-course/intrusion-detection-systems/honeypots.md)
- [Fundamentals of Encryption](https://wiki.zacheller.dev/network-security/courses/isci-cnss-course/fundamentals-of-encryption.md)
- [The History of Encryption](https://wiki.zacheller.dev/network-security/courses/isci-cnss-course/fundamentals-of-encryption/the-history-of-encryption.md)
- [Modern Encryption Methods](https://wiki.zacheller.dev/network-security/courses/isci-cnss-course/fundamentals-of-encryption/modern-encryption-methods.md)
- [Windows and Linux Encryption](https://wiki.zacheller.dev/network-security/courses/isci-cnss-course/fundamentals-of-encryption/windows-and-linux-encryption.md)
- [Hashing](https://wiki.zacheller.dev/network-security/courses/isci-cnss-course/fundamentals-of-encryption/hashing.md)
- [Cracking Passwords](https://wiki.zacheller.dev/network-security/courses/isci-cnss-course/fundamentals-of-encryption/cracking-passwords.md)
- [Virtual Private Networks (VPN)](https://wiki.zacheller.dev/network-security/courses/isci-cnss-course/virtual-private-networks-vpn.md)
- [Introduction to VPN](https://wiki.zacheller.dev/network-security/courses/isci-cnss-course/virtual-private-networks-vpn/introduction-to-vpn.md)
- [VPN Protocols](https://wiki.zacheller.dev/network-security/courses/isci-cnss-course/virtual-private-networks-vpn/vpn-protocols.md)
- [IPSec](https://wiki.zacheller.dev/network-security/courses/isci-cnss-course/virtual-private-networks-vpn/ipsec.md)
- [SSL/TLS](https://wiki.zacheller.dev/network-security/courses/isci-cnss-course/virtual-private-networks-vpn/ssl-tls.md)
- [VPN Solutions](https://wiki.zacheller.dev/network-security/courses/isci-cnss-course/virtual-private-networks-vpn/vpn-solutions.md)
- [Operating System Hardening](https://wiki.zacheller.dev/network-security/courses/isci-cnss-course/operating-system-hardening.md)
- [Configuring Windows](https://wiki.zacheller.dev/network-security/courses/isci-cnss-course/operating-system-hardening/configuring-windows.md)
- [Configuring Linux](https://wiki.zacheller.dev/network-security/courses/isci-cnss-course/operating-system-hardening/configuring-linux.md)
- [Operating System Patches](https://wiki.zacheller.dev/network-security/courses/isci-cnss-course/operating-system-hardening/operating-system-patches.md)
- [Virus Attacks and How to Defend](https://wiki.zacheller.dev/network-security/courses/isci-cnss-course/virus-attacks-and-how-to-defend.md)
- [Virus Types and Attacks](https://wiki.zacheller.dev/network-security/courses/isci-cnss-course/virus-attacks-and-how-to-defend/virus-types-and-attacks.md)
- [Virus Scanners](https://wiki.zacheller.dev/network-security/courses/isci-cnss-course/virus-attacks-and-how-to-defend/virus-scanners.md)
- [Antivirus](https://wiki.zacheller.dev/network-security/courses/isci-cnss-course/virus-attacks-and-how-to-defend/antivirus.md)
- [Virus Infection and Identification](https://wiki.zacheller.dev/network-security/courses/isci-cnss-course/virus-attacks-and-how-to-defend/virus-infection-and-identification.md)
- [Trojan Horses](https://wiki.zacheller.dev/network-security/courses/isci-cnss-course/virus-attacks-and-how-to-defend/trojan-horses.md)
- [Spyware or Adware](https://wiki.zacheller.dev/network-security/courses/isci-cnss-course/virus-attacks-and-how-to-defend/spyware-or-adware.md)
- [Security Policies](https://wiki.zacheller.dev/network-security/courses/isci-cnss-course/security-policies.md)
- [User Policies Definition](https://wiki.zacheller.dev/network-security/courses/isci-cnss-course/security-policies/user-policies-definition.md)
- [System Administration Policies](https://wiki.zacheller.dev/network-security/courses/isci-cnss-course/security-policies/system-administration-policies.md)
- [Access Control](https://wiki.zacheller.dev/network-security/courses/isci-cnss-course/security-policies/access-control.md)
- [Assessing System Security](https://wiki.zacheller.dev/network-security/courses/isci-cnss-course/assessing-system-security.md)
- [Risk Assessment](https://wiki.zacheller.dev/network-security/courses/isci-cnss-course/assessing-system-security/risk-assessment.md)
- [Conducting an Initial Assessment](https://wiki.zacheller.dev/network-security/courses/isci-cnss-course/assessing-system-security/conducting-an-initial-assessment.md)
- [Probing the Network](https://wiki.zacheller.dev/network-security/courses/isci-cnss-course/assessing-system-security/probing-the-network.md)
- [Vulnerabilities](https://wiki.zacheller.dev/network-security/courses/isci-cnss-course/assessing-system-security/vulnerabilities.md)
- [Documenting Security](https://wiki.zacheller.dev/network-security/courses/isci-cnss-course/assessing-system-security/documenting-security.md)
- [Security Standards](https://wiki.zacheller.dev/network-security/courses/isci-cnss-course/security-standards.md)
- [ISO Standards](https://wiki.zacheller.dev/network-security/courses/isci-cnss-course/security-standards/iso-standards.md)
- [NIST Standards](https://wiki.zacheller.dev/network-security/courses/isci-cnss-course/security-standards/nist-standards.md)
- [General Data Protection Regulation (GDPR)](https://wiki.zacheller.dev/network-security/courses/isci-cnss-course/security-standards/general-data-protection-regulation-gdpr.md)
- [PCI DSS](https://wiki.zacheller.dev/network-security/courses/isci-cnss-course/security-standards/pci-dss.md)
- [Physical Security and Recovery](https://wiki.zacheller.dev/network-security/courses/isci-cnss-course/physical-security-and-recovery.md)
- [Physical Security](https://wiki.zacheller.dev/network-security/courses/isci-cnss-course/physical-security-and-recovery/physical-security.md)
- [Disaster Recovery](https://wiki.zacheller.dev/network-security/courses/isci-cnss-course/physical-security-and-recovery/disaster-recovery.md)
- [Fault Tolerance](https://wiki.zacheller.dev/network-security/courses/isci-cnss-course/physical-security-and-recovery/fault-tolerance.md)
- [Attackers Techniques](https://wiki.zacheller.dev/network-security/courses/isci-cnss-course/attackers-techniques.md)
- [Hacking Preparation](https://wiki.zacheller.dev/network-security/courses/isci-cnss-course/attackers-techniques/hacking-preparation.md)
- [The Attack Phase](https://wiki.zacheller.dev/network-security/courses/isci-cnss-course/attackers-techniques/the-attack-phase.md)
- [Hacking Wi-Fi](https://wiki.zacheller.dev/network-security/courses/isci-cnss-course/attackers-techniques/hacking-wi-fi.md)


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://wiki.zacheller.dev/network-security/courses.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
