Free Udemy Courses
Trending

Computer Networks Security from Scratch to Advanced

PUBLISHER :- Mohammad Adly

LANGUAGE :- English

PRIZE :- 122.06$ 0$

Computer Networks Security from Scratch to Advanced

WHO CAN ACCESS THIS COURSE :-

  • Network administrators
  • Cyber security officers
  • Computer science undergraduates
  • Computer engineering undergraduates
  • Network security postgraduates
  • Network technical support specialists
  • Security incident handlers
  • IT Engineers and CEOs
  • Software Developers
  • Web Developers
  • Mobile Applications Developers

WHAT ARE YOUR REQUIREMENTS FOR THIS COURSE ?

  • Basic computer knowledge
  • Basic Internet skills and adequate connection
  • Beginner networking background
  • Microsoft Windows machine
  • Microsoft Power Point for the presentation material
  • Beginner cyber security information
  • Laptop machine and standard browser

WHAT YOU ARE GOING TO LEARN FROM THIS COURSE ?

  • Introduction to Computer Networks
  • ISO/OSI Model (7 Layers)
  • TCP/IP Protocol Suite
  • Wireless Networks
  • Computer Networks Security
  • Firewalls and Honeypots
  • Intrusion Detection and Prevention systems (IDS/IPS)
  • Wireless Networks Security
  • Physical Security & Incident Handling
  • Computer Networks Security Recommendations

DESCRIPTION

Before the finish of this course you will be completely mindful of the wired and remote PC networks rudiments, gadgets, and conventions in a bit by bit pace. You will likewise arrive at the expert level in networks security as far as ideas, advances, and apparatuses. The course requires no foundation or pre-imperative, yet you will have the option to see all the modern phrasings in the organizations security during the talks.

This course is composed as follows:

Area One: prologue to Computer Networks

  • Talk 1: What is a Computer Network?
  • Talk 2: Computer Networks Topologies
  • Talk 3: Computer Networks Categories
  • Talk 4: Computer Networks Devices and Services
  • Talk 5: Computer Networks Transmission Media

Area Two: ISO/OSI Model (7 Layers)

  • Talk 1: Why ISO/OSI Model?
  • Talk 2: Application, Presentation, and Session Layers
  • Talk 3: Transport and Network Layers
  • Talk 4: Data Link and Physical Layers
  • Talk 5: ISO/OSI Model in real life

Segment Three: TCP/IP Protocol Suite

  • Talk 1: Introduction to Computer Networks Protocols
  • Talk 2: IP Protocol
  • Talk 3: TCP and UDP Protocols
  • Talk 4: Application Protocols
  • Talk 5: TCP/IP Characteristics and Tools

Segment Four: Wireless Networks

  • Talk 1: Wireless Networks Benefits
  • Talk 2: Wireless Networks Types
  • Talk 3: Wireless Networks Protocol (Wi-Fi)
  • Talk 4: Wireless Networks Devices
  • Talk 5: Wireless Networks Drawbacks

Segment Five: Computer Networks Security

  • Talk 1: Security Goals
  • Talk 2: Securing the Network Design
  • Talk 3: TCP/IP Security and Tools
  • Talk 4: Port Scanning and Tools
  • Talk 5: Sniffing and Tools

Segment Six: Firewalls and Honeypots

  • Talk 1: Why Using a Firewall?
  • Talk 2: Firewalls Rules
  • Talk 3: Firewalls Filtering
  • Talk 4: Honey Pots
  • Talk 5: Bypassing Firewalls

Segment Seven: Intrusion Detection and Prevention frameworks (IDS/IPS)

  • Talk 1: What is Intrusion Detection Systems (IDS)?
  • Talk 2: Network IDS (NIDS)
  • Talk 3: NIDS Challenges
  • Talk 4: Snort as NIDS
  • Talk 5: Intrusion Prevention Systems (IPS)

Segment Eight: Wireless Networks Security

  • Talk 1: Wired Equivalent Privacy WEP Attacking
  • Talk 2: WPA and AES Protocols
  • Talk 3: Wireless Security Misconceptions
  • Talk 4: Wireless Attacks and Mitigation
  • Talk 5: Secure Network Design with Wireless

Area Nine: Physical Security and Incident Handling

  • Talk 1: Physical Security Objectives
  • Talk 2: Physical Threats and Mitigation
  • Talk 3: Defense in Depth (DiD)
  • Talk 4: What is an Incident?
  • Talk 5: Incident Handling

Segment Ten: Computer Networks Security Conclusion

  • Talk 1: Confidentiality, Integrity, and Availability (CIA)
  • Talk 2: Assets, Threats, and Vulnerabilities
  • Talk 3: Risks and Network Intrusion
  • Talk 4: Common Attacks
  • Talk 5: Security Recommendations

COURSE CONTENT

  • 10 sections • 51 lectures • 8h 4m total length

Introduction to Computer Networks6 lectures • 1hr 1min

  • IntroductionPreview09:57
  • What is a Computer Network?Preview10:29
  • Computer Networks Topologies11:06
  • Computer Networks Categories09:47
  • Computer Networks Devices and Services10:38
  • Computer Networks Transmission Media09:19
  • Quiz on Section One5 questions

ISO/OSI Model (7 Layers)5 lectures • 51min

  • Why ISO/OSI Model?09:56
  • Application, Presentation, and Session Layers11:50
  • Transport and Network Layers10:46
  • Data Link and Physical Layers08:32
  • ISO/OSI Model in Action10:04
  • Quiz on Section Two5 questions

TCP/IP Protocol Suite5 lectures • 58min

  • Introduction to Computer Networks Protocols10:41
  • IP Protocol12:53
  • TCP and UDP Protocols12:28
  • Application Protocols11:36
  • TCP/IP Characteristics and Tools10:39
  • Quiz on Section Three5 questions

Wireless Networks5 lectures • 48min

  • Wireless Networks Benefits09:19
  • Wireless Networks Types12:14
  • Wireless Networks Protocol (Wi-Fi)06:47
  • Wireless Networks Devices10:28
  • Wireless Networks Drawbacks09:23
  • Quiz on Section Four5 questions

Computer Networks Security5 lectures • 52min

  • Security Goals08:53
  • Securing the Network Design10:07
  • TCP/IP Security and Tools11:50
  • Port Scanning and Tools11:15
  • Sniffing and Tools10:18
  • Quiz on Section Five5 questions

Firewalls and Honeypots5 lectures • 47min

  • Why Using a Firewall?12:49
  • Firewalls Rules10:31
  • Firewalls Filtering08:33
  • Honeypots06:42
  • Bypassing Firewalls08:00
  • Quiz on Section Six5 questions

Intrusion Detection and Prevention Systems (IDS/IPS)5 lectures • 42min

  • What is Intrusion Detection Systems (IDS)?11:16
  • Network IDS (NIDS)06:08
  • NIDS Challenges08:55
  • Snort as NIDS08:20
  • Intrusion Prevention Systems (IPS)07:21
  • Quiz on Section Seven5 questions

Wireless Networks Security5 lectures • 46min

  • Wired Equivalent Privacy WEP Attacking10:40
  • WPA and AES Protocols08:31
  • Wireless Security Misconceptions08:39
  • Wireless Attacks and Mitigation09:08
  • Secure Network Design with Wireless08:41
  • Quiz on Section Eight5 questions

Physical Security and Incident Handling5 lectures • 48min

  • Physical Security Objectives10:45
  • Physical Threats and Mitigation10:50
  • Defense in Depth (DiD)07:18
  • What is an Incident?05:40
  • Incident Handling13:50
  • Quiz on Section Nine5 questions

Computer Networks Security Conclusion5 lectures • 31min

  • Confidentiality, Integrity, and Availability (CIA)06:10
  • Assets, Threats, and Vulnerabilities04:10
  • Risks and Network Intrusion05:36
  • Common Attacks08:46
  • Security Recommendations06:18
  • Quiz on Section Ten5 questions
  • Final Exam60 questions

HOW TO MAKE MONEY ONLINE & TIPS AND TRICKS

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button

Adblock Detected

Please consider supporting us by disabling your ad blocker