This course was created with the
course builder. Create your online course today.
Start now
Create your course
with
Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Computer Networks Security from Scratch to Advanced
1.INTRODUCTION TO COMPUTER NETWORKS
1.Introduction (9:57)
2.What is a Computer Network (10:29)
3.Computer Network Topologies (11:06)
4.Computer Networks Categories (9:47)
5.Computer Networks Devices and Services (10:38)
6.Computer Networks Transmission Media (9:19)
2.ISO-OSI MODEL AND IT'S LAYERS
1.Why ISOOSI Model (9:56)
2.Application, Presentation, and Session Layers (11:50)
3.Transport and Network Layers (10:46)
4.Data Link and Physical Layers (8:32)
5.ISOOSI Model in Action (10:04)
3.TCP-IP PROTOCOL SUITE
1.Introduction to Computer Networks Protocols (10:41)
2.IP Protocol (12:53)
3.TCP and UDP Protocols (12:28)
4.Application Protocols (11:36)
5.TCPIP Characteristics and Tools (10:39)
4.WIRELESS NETWORKS
1.Wireless Networks Benefits (9:19)
2.Wireless Networks Types (12:14)
3.Wireless Networks Protocol (Wi-Fi) (6:47)
4.Wireless Networks Devices (10:28)
5.Wireless Networks Drawbacks (9:23)
5.COMPUTER NETWORKS SECURITY
1.Security Goals (8:53)
2.Securing the Network Design (10:07)
3.TCPIP Security and Tools (11:50)
4.Port Scanning and Tools (11:15)
5.Sniffing and Tools (10:18)
6.FIREWALLS AND HONEYPOTS
1.Why Using a Firewall (12:49)
2.Firewalls Rules (10:31)
3.Firewalls Filtering (8:33)
4.Honeypots (6:42)
5.Bypassing Firewalls (8:00)
7.INTRUSION DETECTION AND PREVENTION SYSTEM
1.What is Intrusion Detection Systems (IDS) (11:16)
2.Network IDS (NIDS) (6:08)
4.Snort as NIDS (8:20)
5.Intrusion Prevention Systems (IPS) (7:21)
3.NIDS Challenges (8:55)
8.WIRELESS NETWORK SECURITY
1.Wired Equivalent Privacy WEP Attacking (10:40)
2.WPA and AES Protocols (8:31)
3.Wireless Security Misconceptions (8:39)
4.Wireless Attacks and Mitigation (9:08)
5.Secure Network Design with Wireless (8:41)
9.PHYSICAL SECURITY AND INCIDENT HANDLING
1.Physical Security Objectives (10:45)
2.Physical Threats and Mitigation (10:50)
3.Defense in Depth (DiD) (7:18)
4.What is an Incident (5:40)
5.Incident Handling (13:50)
10.COMPUTER NETWORK SECURITY CONCLUSION
1.Confidentiality, Integrity, and Availability (CIA) (6:10)
2.Assets, Threats, and Vulnerabilities (4:10)
3.Risks and Network Intrusion (5:36)
4.Common Attacks (8:46)
5.Security Recommendations (6:18)
1.Why ISOOSI Model
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock