Tooltip_topics = new Array("Prototype_tooltips","topic1_tooltips","topic2_tooltips","topic3_tooltips","topic4_tooltips","topic5_tooltips","topic6_tooltips","topic7_tooltips","topic8_tooltips","topic9_tooltips","topic10_tooltips","topic11_tooltips");
Prototype_tooltips = new Array("Guided Tour: How to Use this Course");
topic1_tooltips = new Array("Introduction to Networking - Module Overview","Topic 1: Network Architectures - Objectives","Local Area Networks (LANs)","LANs - How Information Is Shared","Metropolitan Area Networks (MANs)","Wide Area Networks (WANs)","The OSI Model - Introduction ","The OSI Model - The Flow of Data","The OSI Model - The Groups of the OSI","The OSI Model - The Upper Three Layers","The OSI Model - The Lower Four Layers","Conclusion","Self Check");
topic2_tooltips = new Array("Topic 2: Network Security - Objectives","Security Fundamentals","Security Fundamentals - General Considerations","Security Threats","Security Threats - Natural Threats","Security Threats - Internal and External Threats","Security Threats - Intentional and Unintentional Threats","Security Threats - Social Engineering","Security Threats - Hackers","Security Threats - Types of Hackers","Security Threats - Types of Attacks","Security and the Internet - Mobile Code","Security and the Internet - Blocking Mobile Code","Security and the Internet - Other Types of Code","Security and the Internet - Evolution of the Internet","Security and the Internet - The Structure of the Internet","Security Strategies - The Network Security Policy","Security Strategies - Passwords","Security Strategies - Limiting Access","Security Strategies - Encryption","Security Strategies - Risk Assessment","Conclusion ","Self Check");
topic3_tooltips = new Array("Topic 3: Defense-in-Depth (DID) Overview - Objectives","Defense-in-Depth","Defense-in-Depth - Balanced Approach","Defense-in-Depth - Goal of DID","Defense-in-Depth - Techniques","Defense-in-Depth - Using Firewalls","Information Assurance","Conclusion","Self Check");
topic4_tooltips = new Array("Firewall Fundamentals - Module Overview","Topic 1: Firewall Overview - Objectives","Introduction to Firewalls","Introduction to Firewalls - A Brief History","Introduction to Firewalls - Security and the Automated Information System","Introduction to Firewalls - Security and Enclaves","Definition of Firewalls","Definition of Firewalls - Firewalls in the Network","Definition of Firewalls - Meeting a Security Posture","Definition of Firewalls - Robustness","Open Systems Interconnection Model Operations","OSI Model Operations - Difference Between Firewalls","Policy Philosophy","Firewall Policy - The Defense-in-Depth Strategy","Legal Considerations","Conclusion","Self Check");
topic5_tooltips = new Array("Topic 2: Firewall Types and Capabilities - Objectives","Overview of Packet Filtering","Packet Filtering Firewalls","Packet Filtering Firewalls - Access Control List","Packet Filtering Firewalls - Advantages and Disadvantages","Stateful Inspection Firewalls","Stateful Inspection Firewalls - Advantages and Disadvantages","Application-Gateway (Proxy) Firewalls","Proxy Firewalls","Proxy Firewalls - Working Across the OSI Model","Proxy Firewalls - Advantages","Proxy Firewalls - Disadvantages","Hybrid Firewalls","Conclusion","Self Check");
topic6_tooltips = new Array("Topic 3: Firewall Architectures and Designs - Objectives","Firewall Architectures - Overview","Dual-Homed Architecture","Dual-Homed Architecture - Packet Forwarding","Dual-Homed Architecture - Disadvantages","Screened Subnet (DMZ) Architecture","Screened Subnet (DMZ) Architecture - Packet Forwarding","Screened Subnet (DMZ) Architecture - Advantages to the DMZ","Firewall Placement","Virtual Private Networks","Virtual Private Networks - Mobile Code","Conclusion","Self Check");
topic7_tooltips = new Array("Topic 4: Firewall Functions and Considerations - Objectives","Firewall Architectures - Overview","Access Control and Filtering","Access Control, Filtering, and the Security Policy","Authentication","Auditing and Reporting","Using Filtering to Protect Against Attacks","Mobile Code","Blocking Mobile Code","Encryption","Network Address Translation","Robustness Strategy - Introduction","Robustness Strategy - Step 1","Robustness Strategy - Steps 2 and 3","Robustness Strategy - Other Considerations","Conclusion","Self Check");
topic8_tooltips = new Array("Introduction to Routers - Module Overview","Topic 1: Introduction to Routing - Objectives","Introduction to Routing","Introduction to Routing - Routers and Switches","Introduction to Routing - Communication Inside the Network","Routing Processes","Routing Processes - Exchanging Information","Routing Processes - Using Routing as a Part of Security","Routing Equipment","Conclusion","Self Check");
topic9_tooltips = new Array("Topic 2: Routing Functionality - Objectives","Frames","Packets","Handling Packets","MAC and IP Addresses","Routing Tables","Routing Tables - Static and Dynamic Methods","Circuit Switched Routing","Packet Switched Routing","When to Use Packet Switching","When to Use Circuit Switching","Conclusion","Self Check");
topic10_tooltips = new Array("Topic 3: Routing Functionality - Objectives","Routed vs. Routing Protocols","Routed Protocols - TCP/IP","Routing Protocols","Routing Protocols - Distance Vector Routing","Routing Protocols - Distance Vector Routing","Routing Protocols - Link State Routing","Routing Protocols - Link State Routing ΓÇô Link State Advertisement","Routing Protocols - Link State Routing - Cost","Routing Protocols - Link State Routing - LSA","Routing Protocols - Link State Routing - Synchronization","Miscellaneous Protocols","Conclusion","Self Check");
topic11_tooltips = new Array("Topic 4: Routing Security - Objectives","Protecting the Router - Types of Attacks","Protecting the Router - Physical Security","Protecting the Router - Security Using Software","Protecting the Router - Security Through Updates","Protecting the Network","Protecting the Network - DID Strategy","Protecting the Network - Creating a DMZ","Protecting the Network - Using a Router as a Firewall","Router Access","Router Access - Securing Remote Connections","Router Access - Virtual Private Networks","Router Access - Public Key Infrastructure","Router Access - Common Access Card","Router Access - Administrative Privileges","Auditing","Auditing - Determining What to Audit","Auditing - Audit Messages","Router Policy","Router Policy - Physical Security","Router Policy - Static Configuration and Software","Conclusion","Self Check");