Curriculum
10 Sections
50 Lessons
52 Weeks
Expand all sections
Collapse all sections
Section One: Introduction to Computer Networks
5
1.1
Intro What is a Computer Network?
9 Minutes
1.2
Topologies
11 Minutes
1.3
Categories
9 Minutes
1.4
Devices and Services
10 Minutes
1.5
Transmission Media
9 Minutes
Section Two: ISO/OSI Model (7 Layers)
5
2.1
Why ISO/OSI Model?
9 Minutes
2.2
Application, Presentation, and Session Layers
11 Minutes
2.3
Transport and Network Layers
10 Minutes
2.4
Data Link and Physical Layers
8 Minutes
2.5
ISO/OSI Model in Action
10 Minutes
Section Three: TCP/IP Protocol Suite
5
3.1
Introduction to Computer Networks Protocols
10 Minutes
3.2
IP Protocol
12 Minutes
3.3
TCP and UDP Protocols
12 Minutes
3.4
Application Protocols
11 Minutes
3.5
TCP/IP Characteristics and Tools
10 Minutes
Section Four: Wireless Networks
5
4.1
Wireless Networks Benefits
9 Minutes
4.2
Wireless Networks Types
12 Minutes
4.3
Wireless Networks Protocol (Wi-Fi)
6 Minutes
4.4
Wireless Networks Devices
10 Minutes
4.5
Wireless Networks Drawbacks
9 Minutes
Section Five: Computer Networks Security
5
5.1
Security Goals
8 Minutes
5.2
Securing the Network Design
10 Minutes
5.3
TCP/IP Security and Tools
11 Minutes
5.4
Port Scanning and Tools
11 Minutes
5.5
Sniffing and Tools
10 Minutes
Section Six: Firewalls and Honeypots
5
6.1
Why Using a Firewall?
12 Minutes
6.2
Firewalls Rules
10 Minutes
6.3
Firewalls Filtering
8 Minutes
6.4
Honey Pots
6 Minutes
6.5
Bypassing Firewalls
8 Minutes
Section Seven: Intrusion Detection and Prevention systems (IDS/IPS)
5
7.1
What is Intrusion Detection Systems (IDS)?
11 Minutes
7.2
Network IDS (NIDS)
6 Minutes
7.3
NIDS Challenges
8 Minutes
7.4
Snort as NIDS
8 Minutes
7.5
Intrusion Prevention Systems (IPS)
7 Minutes
Section Eight: Wireless Networks Security
5
8.1
Wired Equivalent Privacy WEP Attacking
10 Minutes
8.2
WPA and AES Protocols
8 Minutes
8.3
Wireless Security Misconceptions
8 Minutes
8.4
Wireless Attacks and Mitigation
9 Minutes
8.5
Secure Network Design with Wireless
8 Minutes
Section Nine: Physical Security & Incident Handling
5
9.1
Physical Security Objectives
10 Minutes
9.2
Physical Threats and Mitigation
10 Minutes
9.3
Defense in Depth (DiD)
7 Minutes
9.4
What is an Incident?
5 Minutes
9.5
Incident Handling
13 Minutes
Section Ten: Computer Networks Security Conclusion
5
10.1
Confidentiality, Integrity, and Availability (CIA)
6 Minutes
10.2
Assets, Threats, and Vulnerabilities
4 Minutes
10.3
Risks and Network Intrusion
5 Minutes
10.4
Common Attacks
8 Minutes
10.5
Security Recommendations
6 Minutes
Computer Networks Security from Scratch
Search
This content is protected, please
login
and enroll in the course to view this content!
Login with your site account
Lost your password?
Remember Me
Not a member yet?
Register now
Register a new account
Are you a member?
Login now
Modal title
Main Content