Curriculum
10 Sections
50 Lessons
52 Weeks
Expand all sections
Collapse all sections
Section One: Introduction to Computer Networks
5
1.1
Intro What is a Computer Network?
9 Minutes
1.2
Topologies
11 Minutes
1.3
Categories
9 Minutes
1.4
Devices and Services
10 Minutes
1.5
Transmission Media
9 Minutes
Section Two: ISO/OSI Model (7 Layers)
5
2.1
Why ISO/OSI Model?
9 Minutes
2.2
Application, Presentation, and Session Layers
11 Minutes
2.3
Transport and Network Layers
10 Minutes
2.4
Data Link and Physical Layers
8 Minutes
2.5
ISO/OSI Model in Action
10 Minutes
Section Three: TCP/IP Protocol Suite
5
3.1
Introduction to Computer Networks Protocols
10 Minutes
3.2
IP Protocol
12 Minutes
3.3
TCP and UDP Protocols
12 Minutes
3.4
Application Protocols
11 Minutes
3.5
TCP/IP Characteristics and Tools
10 Minutes
Section Four: Wireless Networks
5
4.1
Wireless Networks Benefits
9 Minutes
4.2
Wireless Networks Types
12 Minutes
4.3
Wireless Networks Protocol (Wi-Fi)
6 Minutes
4.4
Wireless Networks Devices
10 Minutes
4.5
Wireless Networks Drawbacks
9 Minutes
Section Five: Computer Networks Security
5
5.1
Security Goals
8 Minutes
5.2
Securing the Network Design
10 Minutes
5.3
TCP/IP Security and Tools
11 Minutes
5.4
Port Scanning and Tools
11 Minutes
5.5
Sniffing and Tools
10 Minutes
Section Six: Firewalls and Honeypots
5
6.1
Why Using a Firewall?
12 Minutes
6.2
Firewalls Rules
10 Minutes
6.3
Firewalls Filtering
8 Minutes
6.4
Honey Pots
6 Minutes
6.5
Bypassing Firewalls
8 Minutes
Section Seven: Intrusion Detection and Prevention systems (IDS/IPS)
5
7.1
What is Intrusion Detection Systems (IDS)?
11 Minutes
7.2
Network IDS (NIDS)
6 Minutes
7.3
NIDS Challenges
8 Minutes
7.4
Snort as NIDS
8 Minutes
7.5
Intrusion Prevention Systems (IPS)
7 Minutes
Section Eight: Wireless Networks Security
5
8.1
Wired Equivalent Privacy WEP Attacking
10 Minutes
8.2
WPA and AES Protocols
8 Minutes
8.3
Wireless Security Misconceptions
8 Minutes
8.4
Wireless Attacks and Mitigation
9 Minutes
8.5
Secure Network Design with Wireless
8 Minutes
Section Nine: Physical Security & Incident Handling
5
9.1
Physical Security Objectives
10 Minutes
9.2
Physical Threats and Mitigation
10 Minutes
9.3
Defense in Depth (DiD)
7 Minutes
9.4
What is an Incident?
5 Minutes
9.5
Incident Handling
13 Minutes
Section Ten: Computer Networks Security Conclusion
5
10.1
Confidentiality, Integrity, and Availability (CIA)
6 Minutes
10.2
Assets, Threats, and Vulnerabilities
4 Minutes
10.3
Risks and Network Intrusion
5 Minutes
10.4
Common Attacks
8 Minutes
10.5
Security Recommendations
6 Minutes
Computer Networks Security from Scratch
Search
Intro What is a Computer Network?
https://dwnk32xmy75f1.cloudfront.net/wp-content/uploads/20180927045039/Intro.mp4
Login with your site account
Lost your password?
Remember Me
Not a member yet?
Register now
Register a new account
Are you a member?
Login now
Modal title
Main Content