Learn wired and wireless computer networks, devices and protocols, and reach the professional level in network security concepts, technologies, and tools. Read more.
Access all courses in our library for only $9/month with All Access Pass
Get Started with All Access PassBuy Only This CourseAbout This Course
Who this course is for:
- Network administrators
- Cyber security officers
- Computer science undergraduates
- Computer engineering undergraduates
- Network security postgraduates
- Network technical support specialists
- Security incident handlers
- IT Engineers and CEOs
- Software Developers
- Web Developers
- Mobile Applications Developers
What you’ll learn:Â
- Introduction to Computer Networks
- ISO/OSI Model (7 Layers)
- TCP/IP Protocol Suite
- Wireless Networks
- Computer Networks Security
- Firewalls and Honeypots
- Intrusion Detection and Prevention systems (IDS/IPS)
- Wireless Networks Security
- Physical Security and Incident Handling
- Computer Networks Security Recommendations
Requirements:Â
- Basic computer knowledge
- Basic internet skills and adequate connection
- Beginner networking background
- Microsoft Windows machine
- Microsoft PowerPoint for the presentation material
- Beginner cyber security information
- Laptop machine and standard browser
By the end of this course, you will be fully aware of the wired and wireless computer networks basics, devices, and protocols in a step-by-step pace. You will also reach the professional level in network security in terms of concepts, technologies, and tools.Â
The course requires no background or pre-requisite, yet you will be able to understand all the up-to-date terminologies in network security during the lectures.
Our Promise to You
By the end of this course, you will have learned network security.
10 Day Money Back Guarantee. If you are unsatisfied for any reason, simply contact us and we’ll give you a full refund. No questions asked.
Get started today and learn more about computer network and cyber security.
Course Curriculum
Section 1 - Introduction To Computer Networks | |||
Introduction | 00:00:00 | ||
What Is A Computer Network? | 00:00:00 | ||
Computer Networks Topologies | 00:00:00 | ||
Computer Networks Categories | 00:00:00 | ||
Computer Networks Devices And Services | 00:00:00 | ||
Computer Networks Transmission Media | 00:00:00 | ||
Section 2 - ISO/OSI Model (7 Layers) | |||
Why ISO/OSI Model? | 00:00:00 | ||
Application, Presentation, And Session Layers | 00:00:00 | ||
Transport And Network Layers | 00:00:00 | ||
Data Link And Physical Layers | 00:00:00 | ||
ISO/OSI Model In Action | 00:00:00 | ||
Section 3 - TCP/IP Protocol Suite | |||
Introduction To Computer Networks Protocols | 00:00:00 | ||
IP Protocol | 00:00:00 | ||
TCP And UDP Protocols | 00:00:00 | ||
Application Protocols | 00:00:00 | ||
TCP/IP Characteristics And Tools | 00:00:00 | ||
Section 4 - Wireless Networks | |||
Wireless Networks Benefits | 00:00:00 | ||
Wireless Networks Types | 00:00:00 | ||
Wireless Networks Protocol (Wi-Fi) | 00:00:00 | ||
Wireless Networks Devices | 00:00:00 | ||
Wireless Networks Drawbacks | 00:00:00 | ||
Section 5 - Computer Networks Security | |||
Security Goals | 00:00:00 | ||
Securing The Network Design | 00:00:00 | ||
TCP/IP Security And Tools | 00:00:00 | ||
Port Scanning And Tools | 00:00:00 | ||
Sniffing And Tools | 00:00:00 | ||
Section 6 - Firewalls And Honeypots | |||
Why Use A Firewall? | 00:00:00 | ||
Firewalls Rules | 00:00:00 | ||
Firewalls Filtering | 00:00:00 | ||
Honeypots | 00:00:00 | ||
Bypassing Firewalls | 00:00:00 | ||
Section 7 - Intrusion Detection And Prevention Systems (IDS/IPS) | |||
What Is Intrusion Detection Systems (IDS)? | 00:00:00 | ||
Network IDS (NIDS) | 00:00:00 | ||
NIDS Challenges | 00:00:00 | ||
Snort As NIDS | 00:00:00 | ||
Intrusion Prevention Systems (IPS) | 00:00:00 | ||
Section 8 - Wireless Networks Security | |||
Wired Equivalent Privacy WEP | 00:00:00 | ||
Attacking WPA And AES Protocols | 00:00:00 | ||
Wireless Security Misconceptions | 00:00:00 | ||
Wireless Attacks And Mitigation | 00:00:00 | ||
Secure Network Design With Wireless | 00:00:00 | ||
Section 9 - Physical Security And Incident Handling | |||
Physical Security Objectives | 00:00:00 | ||
Physical Threats And Mitigation | 00:00:00 | ||
Defense In Depth (DiD) | 00:00:00 | ||
What Is An Incident? | 00:00:00 | ||
Incident Handling | 00:00:00 | ||
Section 10 - Computer Networks Security Conclusion | |||
Confidentiality, Integrity, And Availability (CIA) | 00:00:00 | ||
Assets, Threats, And Vulnerabilities | 00:00:00 | ||
Risks And Network Intrusion | 00:00:00 | ||
Common Attacks | 00:00:00 | ||
Security Recommendations | 00:00:00 | ||
Knowledge Review | 00:00:00 |
About This Course
Who this course is for:
- Network administrators
- Cyber security officers
- Computer science undergraduates
- Computer engineering undergraduates
- Network security postgraduates
- Network technical support specialists
- Security incident handlers
- IT Engineers and CEOs
- Software Developers
- Web Developers
- Mobile Applications Developers
What you’ll learn:Â
- Introduction to Computer Networks
- ISO/OSI Model (7 Layers)
- TCP/IP Protocol Suite
- Wireless Networks
- Computer Networks Security
- Firewalls and Honeypots
- Intrusion Detection and Prevention systems (IDS/IPS)
- Wireless Networks Security
- Physical Security and Incident Handling
- Computer Networks Security Recommendations
Requirements:Â
- Basic computer knowledge
- Basic internet skills and adequate connection
- Beginner networking background
- Microsoft Windows machine
- Microsoft PowerPoint for the presentation material
- Beginner cyber security information
- Laptop machine and standard browser
By the end of this course, you will be fully aware of the wired and wireless computer networks basics, devices, and protocols in a step-by-step pace. You will also reach the professional level in network security in terms of concepts, technologies, and tools.Â
The course requires no background or pre-requisite, yet you will be able to understand all the up-to-date terminologies in network security during the lectures.
Our Promise to You
By the end of this course, you will have learned network security.
10 Day Money Back Guarantee. If you are unsatisfied for any reason, simply contact us and we’ll give you a full refund. No questions asked.
Get started today and learn more about computer network and cyber security.
Course Curriculum
Section 1 - Introduction To Computer Networks | |||
Introduction | 00:00:00 | ||
What Is A Computer Network? | 00:00:00 | ||
Computer Networks Topologies | 00:00:00 | ||
Computer Networks Categories | 00:00:00 | ||
Computer Networks Devices And Services | 00:00:00 | ||
Computer Networks Transmission Media | 00:00:00 | ||
Section 2 - ISO/OSI Model (7 Layers) | |||
Why ISO/OSI Model? | 00:00:00 | ||
Application, Presentation, And Session Layers | 00:00:00 | ||
Transport And Network Layers | 00:00:00 | ||
Data Link And Physical Layers | 00:00:00 | ||
ISO/OSI Model In Action | 00:00:00 | ||
Section 3 - TCP/IP Protocol Suite | |||
Introduction To Computer Networks Protocols | 00:00:00 | ||
IP Protocol | 00:00:00 | ||
TCP And UDP Protocols | 00:00:00 | ||
Application Protocols | 00:00:00 | ||
TCP/IP Characteristics And Tools | 00:00:00 | ||
Section 4 - Wireless Networks | |||
Wireless Networks Benefits | 00:00:00 | ||
Wireless Networks Types | 00:00:00 | ||
Wireless Networks Protocol (Wi-Fi) | 00:00:00 | ||
Wireless Networks Devices | 00:00:00 | ||
Wireless Networks Drawbacks | 00:00:00 | ||
Section 5 - Computer Networks Security | |||
Security Goals | 00:00:00 | ||
Securing The Network Design | 00:00:00 | ||
TCP/IP Security And Tools | 00:00:00 | ||
Port Scanning And Tools | 00:00:00 | ||
Sniffing And Tools | 00:00:00 | ||
Section 6 - Firewalls And Honeypots | |||
Why Use A Firewall? | 00:00:00 | ||
Firewalls Rules | 00:00:00 | ||
Firewalls Filtering | 00:00:00 | ||
Honeypots | 00:00:00 | ||
Bypassing Firewalls | 00:00:00 | ||
Section 7 - Intrusion Detection And Prevention Systems (IDS/IPS) | |||
What Is Intrusion Detection Systems (IDS)? | 00:00:00 | ||
Network IDS (NIDS) | 00:00:00 | ||
NIDS Challenges | 00:00:00 | ||
Snort As NIDS | 00:00:00 | ||
Intrusion Prevention Systems (IPS) | 00:00:00 | ||
Section 8 - Wireless Networks Security | |||
Wired Equivalent Privacy WEP | 00:00:00 | ||
Attacking WPA And AES Protocols | 00:00:00 | ||
Wireless Security Misconceptions | 00:00:00 | ||
Wireless Attacks And Mitigation | 00:00:00 | ||
Secure Network Design With Wireless | 00:00:00 | ||
Section 9 - Physical Security And Incident Handling | |||
Physical Security Objectives | 00:00:00 | ||
Physical Threats And Mitigation | 00:00:00 | ||
Defense In Depth (DiD) | 00:00:00 | ||
What Is An Incident? | 00:00:00 | ||
Incident Handling | 00:00:00 | ||
Section 10 - Computer Networks Security Conclusion | |||
Confidentiality, Integrity, And Availability (CIA) | 00:00:00 | ||
Assets, Threats, And Vulnerabilities | 00:00:00 | ||
Risks And Network Intrusion | 00:00:00 | ||
Common Attacks | 00:00:00 | ||
Security Recommendations | 00:00:00 | ||
Knowledge Review | 00:00:00 |