Computer Networks Security From Scratch To Advnaced

Computer Networks Security Technologies and Tools for Network Admins and Cyber Security Officers

Last updated 2022-01-10 | 4.5

- Introduction to Computer Networks
- ISO/OSI Model (7 Layers)
- TCP/IP Protocol Suite

What you'll learn

Introduction to Computer Networks
ISO/OSI Model (7 Layers)
TCP/IP Protocol Suite
Wireless Networks
Computer Networks Security
Firewalls and Honeypots
Intrusion Detection and Prevention systems (IDS/IPS)
Wireless Networks Security
Physical Security & Incident Handling
Computer Networks Security Recommendations

* Requirements

* Basic computer knowledge
* Basic Internet skills and adequate connection
* Beginner networking background
* Microsoft Windows machine
* Microsoft Power Point for the presentation material
* Beginner cyber security information
* Laptop machine and standard browser

Description

By the end of this course you will be fully aware of the wired and wireless computer networks basics, devices, and protocols in a step-by-step pace. You will also reach the professional level in networks security in terms of concepts, technologies, and tools. The course requires no background or pre-requisite, yet you will be able to understand all the up-to-date terminologies in the networks security during the lectures.

This course is organized as follows:

Section One: introduction to Computer Networks

  • Lecture 1: What is a Computer Network?
  • Lecture 2: Computer Networks Topologies
  • Lecture 3: Computer Networks Categories
  • Lecture 4: Computer Networks Devices and Services
  • Lecture 5: Computer Networks Transmission Media

Section Two: ISO/OSI Model (7 Layers)

  • Lecture 1: Why ISO/OSI Model?
  • Lecture 2: Application, Presentation, and Session Layers
  • Lecture 3: Transport and Network Layers
  • Lecture 4: Data Link and Physical Layers
  • Lecture 5: ISO/OSI Model in Action

Section Three: TCP/IP Protocol Suite

  • Lecture 1: Introduction to Computer Networks Protocols
  • Lecture 2: IP Protocol
  • Lecture 3: TCP and UDP Protocols
  • Lecture 4: Application Protocols
  • Lecture 5: TCP/IP Characteristics and Tools

Section Four: Wireless Networks

  • Lecture 1: Wireless Networks Benefits
  • Lecture 2: Wireless Networks Types
  • Lecture 3: Wireless Networks Protocol (Wi-Fi)
  • Lecture 4: Wireless Networks Devices
  • Lecture 5: Wireless Networks Drawbacks

Section Five: Computer Networks Security

  • Lecture 1: Security Goals
  • Lecture 2: Securing the Network Design
  • Lecture 3: TCP/IP Security and Tools
  • Lecture 4: Port Scanning and Tools
  • Lecture 5: Sniffing and Tools

Section Six: Firewalls and Honeypots

  • Lecture 1: Why Using a Firewall?
  • Lecture 2: Firewalls Rules
  • Lecture 3: Firewalls Filtering
  • Lecture 4: Honey Pots
  • Lecture 5: Bypassing Firewalls

Section Seven: Intrusion Detection and Prevention systems (IDS/IPS)

  • Lecture 1: What is Intrusion Detection Systems (IDS)?
  • Lecture 2: Network IDS (NIDS)
  • Lecture 3: NIDS Challenges
  • Lecture 4: Snort as NIDS
  • Lecture 5: Intrusion Prevention Systems (IPS)

Section Eight: Wireless Networks Security

  • Lecture 1: Wired Equivalent Privacy WEP Attacking
  • Lecture 2: WPA and AES Protocols
  • Lecture 3: Wireless Security Misconceptions
  • Lecture 4: Wireless Attacks and Mitigation
  • Lecture 5: Secure Network Design with Wireless

Section Nine: Physical Security & Incident Handling

  • Lecture 1: Physical Security Objectives
  • Lecture 2: Physical Threats and Mitigation
  • Lecture 3: Defense in Depth (DiD)
  • Lecture 4: What is an Incident?
  • Lecture 5: Incident Handling

Section Ten: Computer Networks Security Conclusion

  • Lecture 1: Confidentiality, Integrity, and Availability (CIA)
  • Lecture 2: Assets, Threats, and Vulnerabilities
  • Lecture 3: Risks and Network Intrusion
  • Lecture 4: Common Attacks
  • Lecture 5: Security Recommendations

Who this course is for:

  • Network administrators
  • Cyber security officers
  • Computer science undergraduates
  • Computer engineering undergraduates
  • Network security postgraduates
  • Network technical support specialists
  • Security incident handlers
  • IT Engineers and CEOs
  • Software Developers
  • Web Developers
  • Mobile Applications Developers

Course content

10 sections • 62 lectures

Introduction Preview 09:57

What is a Computer Network? Preview 10:29

Computer Networks Topologies Preview 11:06

Computer Networks Categories Preview 09:47

Computer Networks Devices and Services Preview 10:38

Computer Networks Transmission Media Preview 09:19

Quiz on Section One

Tests your information about Section One

Why ISO/OSI Model? Preview 09:56

Application, Presentation, and Session Layers Preview 11:50

Transport and Network Layers Preview 10:46

Data Link and Physical Layers Preview 08:32

ISO/OSI Model in Action Preview 10:04

Quiz on Section Two

Test your information about Section Two

Introduction to Computer Networks Protocols Preview 10:41

IP Protocol Preview 12:53

TCP and UDP Protocols Preview 12:28

Application Protocols Preview 11:36

TCP/IP Characteristics and Tools Preview 10:39

Quiz on Section Three

Test your information about Section Three

Wireless Networks Benefits Preview 09:19

Wireless Networks Types Preview 12:14

Wireless Networks Protocol (Wi-Fi) Preview 06:47

Wireless Networks Devices Preview 10:28

Wireless Networks Drawbacks Preview 09:23

Quiz on Section Four

Test your information about Section Four

Security Goals Preview 08:53

Securing the Network Design Preview 10:07

TCP/IP Security and Tools Preview 11:50

Port Scanning and Tools Preview 11:15

Sniffing and Tools Preview 10:18

Quiz on Section Five

Test your information about Section Five

Why Using a Firewall? Preview 12:49

Firewalls Rules Preview 10:31

Firewalls Filtering Preview 08:33

Honeypots Preview 06:42

Bypassing Firewalls Preview 08:00

Quiz on Section Six

Test your information about Section Six

What is Intrusion Detection Systems (IDS)? Preview 11:16

Network IDS (NIDS) Preview 06:08

NIDS Challenges Preview 08:55

Snort as NIDS Preview 08:20

Intrusion Prevention Systems (IPS) Preview 07:21

Quiz on Section Seven

Test your information about Section Seven

Wired Equivalent Privacy WEP Attacking Preview 10:40

WPA and AES Protocols Preview 08:31

Wireless Security Misconceptions Preview 08:39

Wireless Attacks and Mitigation Preview 09:08

Secure Network Design with Wireless Preview 08:41

Quiz on Section Eight

Test your information on Section Eight

Physical Security Objectives Preview 10:45

Physical Threats and Mitigation Preview 10:50

Defense in Depth (DiD) Preview 07:18

What is an Incident? Preview 05:40

Incident Handling Preview 13:50

Quiz on Section Nine

Test your information on Section Nine

Confidentiality, Integrity, and Availability (CIA) Preview 06:10

Assets, Threats, and Vulnerabilities Preview 04:10

Risks and Network Intrusion Preview 05:36

Common Attacks Preview 08:46

Security Recommendations Preview 06:18

Quiz on Section Ten

Test your information about Section Ten

Final Exam

This exam tests your overall comprehension of this course, and stresses on the data you need to come out with from it.