Computer Networks Security From Scratch To Advnaced
Tags: Network Security
Computer Networks Security Technologies and Tools for Network Admins and Cyber Security Officers
Last updated 2022-01-10 | 4.5
- Introduction to Computer Networks- ISO/OSI Model (7 Layers)
- TCP/IP Protocol Suite
What you'll learn
* Requirements
* Basic computer knowledge* Basic Internet skills and adequate connection
* Beginner networking background
* Microsoft Windows machine
* Microsoft Power Point for the presentation material
* Beginner cyber security information
* Laptop machine and standard browser
Description
By the end of this course you will be fully aware of the wired and wireless computer networks basics, devices, and protocols in a step-by-step pace. You will also reach the professional level in networks security in terms of concepts, technologies, and tools. The course requires no background or pre-requisite, yet you will be able to understand all the up-to-date terminologies in the networks security during the lectures.
This course is organized as follows:
Section One: introduction to Computer Networks
- Lecture 1: What is a Computer Network?
- Lecture 2: Computer Networks Topologies
- Lecture 3: Computer Networks Categories
- Lecture 4: Computer Networks Devices and Services
- Lecture 5: Computer Networks Transmission Media
Section Two: ISO/OSI Model (7 Layers)
- Lecture 1: Why ISO/OSI Model?
- Lecture 2: Application, Presentation, and Session Layers
- Lecture 3: Transport and Network Layers
- Lecture 4: Data Link and Physical Layers
- Lecture 5: ISO/OSI Model in Action
Section Three: TCP/IP Protocol Suite
- Lecture 1: Introduction to Computer Networks Protocols
- Lecture 2: IP Protocol
- Lecture 3: TCP and UDP Protocols
- Lecture 4: Application Protocols
- Lecture 5: TCP/IP Characteristics and Tools
Section Four: Wireless Networks
- Lecture 1: Wireless Networks Benefits
- Lecture 2: Wireless Networks Types
- Lecture 3: Wireless Networks Protocol (Wi-Fi)
- Lecture 4: Wireless Networks Devices
- Lecture 5: Wireless Networks Drawbacks
Section Five: Computer Networks Security
- Lecture 1: Security Goals
- Lecture 2: Securing the Network Design
- Lecture 3: TCP/IP Security and Tools
- Lecture 4: Port Scanning and Tools
- Lecture 5: Sniffing and Tools
Section Six: Firewalls and Honeypots
- Lecture 1: Why Using a Firewall?
- Lecture 2: Firewalls Rules
- Lecture 3: Firewalls Filtering
- Lecture 4: Honey Pots
- Lecture 5: Bypassing Firewalls
Section Seven: Intrusion Detection and Prevention systems (IDS/IPS)
- Lecture 1: What is Intrusion Detection Systems (IDS)?
- Lecture 2: Network IDS (NIDS)
- Lecture 3: NIDS Challenges
- Lecture 4: Snort as NIDS
- Lecture 5: Intrusion Prevention Systems (IPS)
Section Eight: Wireless Networks Security
- Lecture 1: Wired Equivalent Privacy WEP Attacking
- Lecture 2: WPA and AES Protocols
- Lecture 3: Wireless Security Misconceptions
- Lecture 4: Wireless Attacks and Mitigation
- Lecture 5: Secure Network Design with Wireless
Section Nine: Physical Security & Incident Handling
- Lecture 1: Physical Security Objectives
- Lecture 2: Physical Threats and Mitigation
- Lecture 3: Defense in Depth (DiD)
- Lecture 4: What is an Incident?
- Lecture 5: Incident Handling
Section Ten: Computer Networks Security Conclusion
- Lecture 1: Confidentiality, Integrity, and Availability (CIA)
- Lecture 2: Assets, Threats, and Vulnerabilities
- Lecture 3: Risks and Network Intrusion
- Lecture 4: Common Attacks
- Lecture 5: Security Recommendations
Who this course is for:
- Network administrators
- Cyber security officers
- Computer science undergraduates
- Computer engineering undergraduates
- Network security postgraduates
- Network technical support specialists
- Security incident handlers
- IT Engineers and CEOs
- Software Developers
- Web Developers
- Mobile Applications Developers
Course content
10 sections • 62 lectures
Introduction Preview 09:57
What is a Computer Network? Preview 10:29
Computer Networks Topologies Preview 11:06
Computer Networks Categories Preview 09:47
Computer Networks Devices and Services Preview 10:38
Computer Networks Transmission Media Preview 09:19
Quiz on Section One
Tests your information about Section One
Why ISO/OSI Model? Preview 09:56
Application, Presentation, and Session Layers Preview 11:50
Transport and Network Layers Preview 10:46
Data Link and Physical Layers Preview 08:32
ISO/OSI Model in Action Preview 10:04
Quiz on Section Two
Test your information about Section Two
Introduction to Computer Networks Protocols Preview 10:41
IP Protocol Preview 12:53
TCP and UDP Protocols Preview 12:28
Application Protocols Preview 11:36
TCP/IP Characteristics and Tools Preview 10:39
Quiz on Section Three
Test your information about Section Three
Wireless Networks Benefits Preview 09:19
Wireless Networks Types Preview 12:14
Wireless Networks Protocol (Wi-Fi) Preview 06:47
Wireless Networks Devices Preview 10:28
Wireless Networks Drawbacks Preview 09:23
Quiz on Section Four
Test your information about Section Four
Security Goals Preview 08:53
Securing the Network Design Preview 10:07
TCP/IP Security and Tools Preview 11:50
Port Scanning and Tools Preview 11:15
Sniffing and Tools Preview 10:18
Quiz on Section Five
Test your information about Section Five
Why Using a Firewall? Preview 12:49
Firewalls Rules Preview 10:31
Firewalls Filtering Preview 08:33
Honeypots Preview 06:42
Bypassing Firewalls Preview 08:00
Quiz on Section Six
Test your information about Section Six
What is Intrusion Detection Systems (IDS)? Preview 11:16
Network IDS (NIDS) Preview 06:08
NIDS Challenges Preview 08:55
Snort as NIDS Preview 08:20
Intrusion Prevention Systems (IPS) Preview 07:21
Quiz on Section Seven
Test your information about Section Seven
Wired Equivalent Privacy WEP Attacking Preview 10:40
WPA and AES Protocols Preview 08:31
Wireless Security Misconceptions Preview 08:39
Wireless Attacks and Mitigation Preview 09:08
Secure Network Design with Wireless Preview 08:41
Quiz on Section Eight
Test your information on Section Eight
Physical Security Objectives Preview 10:45
Physical Threats and Mitigation Preview 10:50
Defense in Depth (DiD) Preview 07:18
What is an Incident? Preview 05:40
Incident Handling Preview 13:50
Quiz on Section Nine
Test your information on Section Nine
Confidentiality, Integrity, and Availability (CIA) Preview 06:10
Assets, Threats, and Vulnerabilities Preview 04:10
Risks and Network Intrusion Preview 05:36
Common Attacks Preview 08:46
Security Recommendations Preview 06:18
Quiz on Section Ten
Test your information about Section Ten
Final Exam
This exam tests your overall comprehension of this course, and stresses on the data you need to come out with from it.