Reply To: OCU C)NP A Week 02 Lesson 03 Discussion

Ashly Jackson

There are three main types of network protocols: These include network management protocols, network communication protocols, and network security protocols. Network Management Protocol Purpose Network Management Protocol (SNMP) is an Internet standard protocol for collecting and organizing information about managed devices on an IP network and for modifying this information to change the behavior of the devices. is. Devices that typically support SNMP include cable modems, routers, switches, servers, workstations, printers, and more. The purpose of a network communications protocol is to define a set of protocols (that is, rules and standards) that enable network communications or internetworking to enable application programs to communicate with each other, regardless of the hardware or operating system on which they run. is. Ultimately, network security protocols are the rules and procedures that govern the secure transmission of data over computer networks. These protocols ensure that hackers, viruses, and other unauthorized persons or systems cannot access other people’s personal data and information. Network security protocols are network protocols that ensure the integrity and security of data sent over network connections. The specific network security protocols used depend on the type of data being protected and the network connection. A good network security system can help your business reduce the risk of data theft and sabotage. Network security helps protect your workstation from harmful spyware. It also ensures that your shared data remains secure.


Please Note:

The support ticket system is for technical questions and post-sale issues.


If you have pre-sale questions please use our chat feature or email .

Cybersecurity Certifications for Today's INFOSEC Careers

Mile2 Cybersecurity Certifications is a world-leader in providing accredited education, training, and certifications for INFOSEC professionals. We strive to deliver the best course ware, the strongest Cyber Range, and the most user-friendly exam system in the market.


Our training courses follow our role-based Certification Roadmap. Plus, many of our classes include hands-on skill development in our Cyber Range.  We train students in penetration testing,disaster recovery, incident handling, and network forensics.  Additionally, our Information Assurance training certification meets military, government, private sector and institutional specifications.  



We've developed training for...

Canada Army Navy Airforce

The Canadian Department of National Defense


The United States Air Force

Defense Logistics Agency

A United States Counterintelligence Agency

Texas Workforce Commission

Texas Workforce Commission

error: Alert: Content is protected !!