This website uses cookies to ensure you get the best experience on our website. Privacy Policy OK

Firewalls: Relationships Among Firewall Perimeters

By

In this learning activity you'll examine how firewalls block viruses by discussing trusted, semi-trusted, and untrusted networks.

You may also like

Creative Commons Attribution-NonCommercial 4.0 International License.

Learn more about the license »

 223
Creative Commons License
Firewalls: Relationships Among Firewall Perimeters by Fox Valley Technical College is licensed under a Creative Commons Attribution 4.0 International License.

This workforce product was funded by a grant awarded by the U.S. Department of Labor’s Employment and Training Administration. The product was created by the grantee and does not necessarily reflect the official position of the U.S. Department of Labor. The U.S. Department of Labor makes no guarantees, warranties, or assurances of any kind, express or implied, with respect to such information, including any information on linked sites and including, but not limited to, accuracy of the information or its completeness, timeliness, usefulness, adequacy, continued availability, or ownership. This is an equal opportunity program. Assistive technologies are available upon request and include Voice/TTY (771 or 800-947-6644).

Interface Logo