Course Curriculum
Introduction | |||
Introduction | 00:10:00 | ||
Section 01: An Introduction to Computer Networks | |||
1.1 Computer Network | 00:11:00 | ||
1.2 Computer Network Topologies | 00:11:00 | ||
1.3 Categories of Computer Network | 00:10:00 | ||
1.4 Computer Network Devices | 00:11:00 | ||
1.5 Transmission Media | 00:09:00 | ||
Section 02: ISO/OSI Model | |||
2.1 ISO/OSI Model | 00:10:00 | ||
2.2 Application, Presentation, and Session Layers | 00:12:00 | ||
2.3 Transport and Network Layers | 00:11:00 | ||
2.4 Data Link and Physical Layers | 00:09:00 | ||
2.5 ISO/OSI Model in Action | 00:10:00 | ||
Section 03: TCP/IP Protocols | |||
3.1 Introduction to Computer Networks Protocols | 00:11:00 | ||
3.2 IP Protocol | 00:13:00 | ||
3.3 TCP and UDP Protocols | 00:12:00 | ||
3.4 Application Protocols | 00:12:00 | ||
3.5 TCP/IP Characteristics and Tools | 00:11:00 | ||
Section 04: Wireless Networks | |||
4.1 Wireless Networks Benefits | 00:09:00 | ||
4.2 Types of Wireless Networks | 00:12:00 | ||
4.3 Wireless Networks Protocol (Wi-Fi) | 00:07:00 | ||
4.4 Wireless Networks Devices | 00:10:00 | ||
4.5 Wireless Networks Drawbacks | 00:09:00 | ||
Section 05: Network Security | |||
5.1 Security Goals | 00:09:00 | ||
5.2 Securing the Network Design | 00:10:00 | ||
5.3 TCP/IP Security and Tools | 00:12:00 | ||
5.4 Port Scanning and Tools | 00:11:00 | ||
5.5 Sniffing and Tools | 00:10:00 | ||
Section 06: Firewalls and Honeypots | |||
6.1 Reasons to Use Firewall | 00:13:00 | ||
6.2 Firewalls Rules | 00:11:00 | ||
6.3 Firewalls Filtering | 00:09:00 | ||
6.4 Honeypots | 00:07:00 | ||
6.5 Bypassing Firewalls | 00:08:00 | ||
Section 07: Intrusion Detection and Prevention System | |||
7.1 Intrusion Detection System: IDS | 00:11:00 | ||
7.2 Network IDS: NIDS | 00:06:00 | ||
7.3 NIDS Challenges | 00:09:00 | ||
7.4 Snort as NIDS | 00:08:00 | ||
7.5 Intrusion Prevention Systems: IPS | 00:07:00 | ||
Section 08: Wireless Network Security | |||
8.1 Wired Equivalent Privacy WEP Attacking | 00:11:00 | ||
8.2 WPA and AES Protocols | 00:09:00 | ||
8.3 Wireless Security Misconceptions | 00:09:00 | ||
8.4 Wireless Attacks and Mitigation | 00:09:00 | ||
8.5 Secure Network Design with Wireless | 00:09:00 | ||
Section 09: Physical Security and Incident Handling | |||
9.1 Physical Security Objectives | 00:11:00 | ||
9.2 Physical Threats and Mitigation | 00:11:00 | ||
9.3 Defense in Depth (DiD) | 00:07:00 | ||
9.4 Incident | 00:06:00 | ||
9.5 Incident Handling | 00:14:00 | ||
Section 10: Network Security: Conclusion | |||
10.1 Confidentiality, Integrity, and Availability (CIA) | 00:06:00 | ||
10.2 Assets, Threats, and Vulnerabilities | 00:04:00 | ||
10.3 Risks and Network Intrusion | 00:06:00 | ||
10.4 Common Attacks | 00:09:00 | ||
10.5 Security Recommendations | 00:06:00 | ||
Certificate and Transcript | |||
Order Your Certificates or Transcripts | 00:00:00 |
Diploma in Computer Networks Security
Course Reviews
No Reviews found for this course.