Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Computer Networks Security from Scratch to Advanced
1.INTRODUCTION TO COMPUTER NETWORKS
1.Introduction (9:57)
2.What is a Computer Network (10:29)
3.Computer Network Topologies (11:06)
4.Computer Networks Categories (9:47)
5.Computer Networks Devices and Services (10:38)
6.Computer Networks Transmission Media (9:19)
2.ISO-OSI MODEL AND IT'S LAYERS
1.Why ISOOSI Model (9:56)
2.Application, Presentation, and Session Layers (11:50)
3.Transport and Network Layers (10:46)
4.Data Link and Physical Layers (8:32)
5.ISOOSI Model in Action (10:04)
3.TCP-IP PROTOCOL SUITE
1.Introduction to Computer Networks Protocols (10:41)
2.IP Protocol (12:53)
3.TCP and UDP Protocols (12:28)
4.Application Protocols (11:36)
5.TCPIP Characteristics and Tools (10:39)
4.WIRELESS NETWORKS
1.Wireless Networks Benefits (9:19)
2.Wireless Networks Types (12:14)
3.Wireless Networks Protocol (Wi-Fi) (6:47)
4.Wireless Networks Devices (10:28)
5.Wireless Networks Drawbacks (9:23)
5.COMPUTER NETWORKS SECURITY
1.Security Goals (8:53)
2.Securing the Network Design (10:07)
3.TCPIP Security and Tools (11:50)
4.Port Scanning and Tools (11:15)
5.Sniffing and Tools (10:18)
6.FIREWALLS AND HONEYPOTS
1.Why Using a Firewall (12:49)
2.Firewalls Rules (10:31)
3.Firewalls Filtering (8:33)
4.Honeypots (6:42)
5.Bypassing Firewalls (8:00)
7.INTRUSION DETECTION AND PREVENTION SYSTEM
1.What is Intrusion Detection Systems (IDS) (11:16)
2.Network IDS (NIDS) (6:08)
4.Snort as NIDS (8:20)
5.Intrusion Prevention Systems (IPS) (7:21)
3.NIDS Challenges (8:55)
8.WIRELESS NETWORK SECURITY
1.Wired Equivalent Privacy WEP Attacking (10:40)
2.WPA and AES Protocols (8:31)
3.Wireless Security Misconceptions (8:39)
4.Wireless Attacks and Mitigation (9:08)
5.Secure Network Design with Wireless (8:41)
9.PHYSICAL SECURITY AND INCIDENT HANDLING
1.Physical Security Objectives (10:45)
2.Physical Threats and Mitigation (10:50)
3.Defense in Depth (DiD) (7:18)
4.What is an Incident (5:40)
5.Incident Handling (13:50)
10.COMPUTER NETWORK SECURITY CONCLUSION
1.Confidentiality, Integrity, and Availability (CIA) (6:10)
2.Assets, Threats, and Vulnerabilities (4:10)
3.Risks and Network Intrusion (5:36)
4.Common Attacks (8:46)
5.Security Recommendations (6:18)
Teach online with
2.Physical Threats and Mitigation
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock