PUBLISHER :- Mohammad Adly
LANGUAGE :- English
PRIZE :-
122.06$0$
Computer Networks Security from Scratch to Advanced
WHO CAN ACCESS THIS COURSE :-
- Network administrators
- Cyber security officers
- Computer science undergraduates
- Computer engineering undergraduates
- Network security postgraduates
- Network technical support specialists
- Security incident handlers
- IT Engineers and CEOs
- Software Developers
- Web Developers
- Mobile Applications Developers
WHAT ARE YOUR REQUIREMENTS FOR THIS COURSE ?
- Basic computer knowledge
- Basic Internet skills and adequate connection
- Beginner networking background
- Microsoft Windows machine
- Microsoft Power Point for the presentation material
- Beginner cyber security information
- Laptop machine and standard browser
WHAT YOU ARE GOING TO LEARN FROM THIS COURSE ?
- Introduction to Computer Networks
- ISO/OSI Model (7 Layers)
- TCP/IP Protocol Suite
- Wireless Networks
- Computer Networks Security
- Firewalls and Honeypots
- Intrusion Detection and Prevention systems (IDS/IPS)
- Wireless Networks Security
- Physical Security & Incident Handling
- Computer Networks Security Recommendations
DESCRIPTION
Before the finish of this course you will be completely mindful of the wired and remote PC networks rudiments, gadgets, and conventions in a bit by bit pace. You will likewise arrive at the expert level in networks security as far as ideas, advances, and apparatuses. The course requires no foundation or pre-imperative, yet you will have the option to see all the modern phrasings in the organizations security during the talks.
This course is composed as follows:
Area One: prologue to Computer Networks
- Talk 1: What is a Computer Network?
- Talk 2: Computer Networks Topologies
- Talk 3: Computer Networks Categories
- Talk 4: Computer Networks Devices and Services
- Talk 5: Computer Networks Transmission Media
Area Two: ISO/OSI Model (7 Layers)
- Talk 1: Why ISO/OSI Model?
- Talk 2: Application, Presentation, and Session Layers
- Talk 3: Transport and Network Layers
- Talk 4: Data Link and Physical Layers
- Talk 5: ISO/OSI Model in real life
Segment Three: TCP/IP Protocol Suite
- Talk 1: Introduction to Computer Networks Protocols
- Talk 2: IP Protocol
- Talk 3: TCP and UDP Protocols
- Talk 4: Application Protocols
- Talk 5: TCP/IP Characteristics and Tools
Segment Four: Wireless Networks
- Talk 1: Wireless Networks Benefits
- Talk 2: Wireless Networks Types
- Talk 3: Wireless Networks Protocol (Wi-Fi)
- Talk 4: Wireless Networks Devices
- Talk 5: Wireless Networks Drawbacks
Segment Five: Computer Networks Security
- Talk 1: Security Goals
- Talk 2: Securing the Network Design
- Talk 3: TCP/IP Security and Tools
- Talk 4: Port Scanning and Tools
- Talk 5: Sniffing and Tools
Segment Six: Firewalls and Honeypots
- Talk 1: Why Using a Firewall?
- Talk 2: Firewalls Rules
- Talk 3: Firewalls Filtering
- Talk 4: Honey Pots
- Talk 5: Bypassing Firewalls
Segment Seven: Intrusion Detection and Prevention frameworks (IDS/IPS)
- Talk 1: What is Intrusion Detection Systems (IDS)?
- Talk 2: Network IDS (NIDS)
- Talk 3: NIDS Challenges
- Talk 4: Snort as NIDS
- Talk 5: Intrusion Prevention Systems (IPS)
Segment Eight: Wireless Networks Security
- Talk 1: Wired Equivalent Privacy WEP Attacking
- Talk 2: WPA and AES Protocols
- Talk 3: Wireless Security Misconceptions
- Talk 4: Wireless Attacks and Mitigation
- Talk 5: Secure Network Design with Wireless
Area Nine: Physical Security and Incident Handling
- Talk 1: Physical Security Objectives
- Talk 2: Physical Threats and Mitigation
- Talk 3: Defense in Depth (DiD)
- Talk 4: What is an Incident?
- Talk 5: Incident Handling
Segment Ten: Computer Networks Security Conclusion
- Talk 1: Confidentiality, Integrity, and Availability (CIA)
- Talk 2: Assets, Threats, and Vulnerabilities
- Talk 3: Risks and Network Intrusion
- Talk 4: Common Attacks
- Talk 5: Security Recommendations
COURSE CONTENT
- 10 sections • 51 lectures • 8h 4m total length
Introduction to Computer Networks6 lectures • 1hr 1min
- IntroductionPreview09:57
- What is a Computer Network?Preview10:29
- Computer Networks Topologies11:06
- Computer Networks Categories09:47
- Computer Networks Devices and Services10:38
- Computer Networks Transmission Media09:19
- Quiz on Section One5 questions
ISO/OSI Model (7 Layers)5 lectures • 51min
- Why ISO/OSI Model?09:56
- Application, Presentation, and Session Layers11:50
- Transport and Network Layers10:46
- Data Link and Physical Layers08:32
- ISO/OSI Model in Action10:04
- Quiz on Section Two5 questions
TCP/IP Protocol Suite5 lectures • 58min
- Introduction to Computer Networks Protocols10:41
- IP Protocol12:53
- TCP and UDP Protocols12:28
- Application Protocols11:36
- TCP/IP Characteristics and Tools10:39
- Quiz on Section Three5 questions
Wireless Networks5 lectures • 48min
- Wireless Networks Benefits09:19
- Wireless Networks Types12:14
- Wireless Networks Protocol (Wi-Fi)06:47
- Wireless Networks Devices10:28
- Wireless Networks Drawbacks09:23
- Quiz on Section Four5 questions
Computer Networks Security5 lectures • 52min
- Security Goals08:53
- Securing the Network Design10:07
- TCP/IP Security and Tools11:50
- Port Scanning and Tools11:15
- Sniffing and Tools10:18
- Quiz on Section Five5 questions
Firewalls and Honeypots5 lectures • 47min
- Why Using a Firewall?12:49
- Firewalls Rules10:31
- Firewalls Filtering08:33
- Honeypots06:42
- Bypassing Firewalls08:00
- Quiz on Section Six5 questions
Intrusion Detection and Prevention Systems (IDS/IPS)5 lectures • 42min
- What is Intrusion Detection Systems (IDS)?11:16
- Network IDS (NIDS)06:08
- NIDS Challenges08:55
- Snort as NIDS08:20
- Intrusion Prevention Systems (IPS)07:21
- Quiz on Section Seven5 questions
Wireless Networks Security5 lectures • 46min
- Wired Equivalent Privacy WEP Attacking10:40
- WPA and AES Protocols08:31
- Wireless Security Misconceptions08:39
- Wireless Attacks and Mitigation09:08
- Secure Network Design with Wireless08:41
- Quiz on Section Eight5 questions
Physical Security and Incident Handling5 lectures • 48min
- Physical Security Objectives10:45
- Physical Threats and Mitigation10:50
- Defense in Depth (DiD)07:18
- What is an Incident?05:40
- Incident Handling13:50
- Quiz on Section Nine5 questions
Computer Networks Security Conclusion5 lectures • 31min
- Confidentiality, Integrity, and Availability (CIA)06:10
- Assets, Threats, and Vulnerabilities04:10
- Risks and Network Intrusion05:36
- Common Attacks08:46
- Security Recommendations06:18
- Quiz on Section Ten5 questions
- Final Exam60 questions