Cybersecurity of Networks from Scratch to Advanced
Computer Networks Security Technologies and Tools for Network Admins and Cyber Security Officers
IT and Software ,Network and Security,Network Security
Lectures -51
Duration -8 hours
Lifetime Access
Lifetime Access
30-days Money-Back Guarantee
Get your team access to 10000+ top Tutorials Point courses anytime, anywhere.
Course Description
This course is organized as follows:
Section One: Introduction to Computer Networks
- Lecture 1: What is a Computer Network?
- Lecture 2: Computer Networks Topologies
- Lecture 3: Computer Networks Categories
- Lecture 4: Computer Networks Devices and Services
- Lecture 5: Computer Networks Transmission Media
- Lecture 1: Why ISO/OSI Model?
- Lecture 2: Application, Presentation, and Session Layers
- Lecture 3: Transport and Network Layers
- Lecture 4: Data Link and Physical Layers
- Lecture 5: ISO/OSI Model in Action
- Lecture 1: Introduction to Computer Networks Protocols
- Lecture 2: IP Protocol
- Lecture 3: TCP and UDP Protocols
- Lecture 4: Application Protocols
- Lecture 5: TCP/IP Characteristics and Tools
- Lecture 1: Wireless Networks Benefits
- Lecture 2: Wireless Networks Types
- Lecture 3: Wireless Networks Protocol (Wi-Fi)
- Lecture 4: Wireless Networks Devices
- Lecture 5: Wireless Networks Drawbacks
- Lecture 1: Security Goals
- Lecture 2: Securing the Network Design
- Lecture 3: TCP/IP Security and Tools
- Lecture 4: Port Scanning and Tools
- Lecture 5: Sniffing and Tools
- Lecture 1: Why Using a Firewall?
- Lecture 2: Firewalls Rules
- Lecture 3: Firewalls Filtering
- Lecture 4: Honeypots
- Lecture 5: Bypassing Firewalls
- Lecture 1: What is Intrusion Detection Systems (IDS)?
- Lecture 2: Network IDS (NIDS)
- Lecture 3: NIDS Challenges
- Lecture 4: Snort as NIDS
- Lecture 5: Intrusion Prevention Systems (IPS)
- Lecture 1: Wired Equivalent Privacy WEP Attacking
- Lecture 2: WPA and AES Protocols
- Lecture 3: Wireless Security Misconceptions
- Lecture 4: Wireless Attacks and Mitigation
- Lecture 5: Secure Network Design with Wireless
- Lecture 1: Physical Security Objectives
- Lecture 2: Physical Threats and Mitigation
- Lecture 3: Defense in Depth (DiD)
- Lecture 4: What is an Incident?
- Lecture 5: Incident Handling
- Lecture 1: Confidentiality, Integrity, and Availability (CIA)
- Lecture 2: Assets, Threats, and Vulnerabilities
- Lecture 3: Risks and Network Intrusion
- Lecture 4: Common Attacks
- Lecture 5: Security Recommendations
Who this course is for:
- Network administrators
- Cyber security officers
- Computer science undergraduates
- Computer engineering undergraduates
- Network security postgraduates
- Network technical support specialists
- Security incident handlers
- IT Engineers and CEOs
- Software Developers
- Web Developers
- Mobile Applications Developers.
Goals
- Introduction to Computer Networks
- ISO/OSI Model (7 Layers)
- TCP/IP Protocol Suite
- Wireless Networks
- Computer Networks Security
- Firewalls and Honeypots
- Intrusion Detection and Prevention systems (IDS/IPS)
- Wireless Networks Security
- Physical Security & Incident Handling
- Computer Networks Security Recommendations
Prerequisites
- Basic computer knowledge
- Basic Internet skills and adequate connection
- Beginner networking background
- Microsoft Windows machine
- Microsoft Power Point for the presentation material
- Beginner cyber security information
- Laptop machine and standard browser

Curriculum
Check out the detailed breakdown of what’s inside the course
Introduction to computer networks
6 Lectures
-
Introduction 09:57 09:57
-
What is a Computer Network? 10:29 10:29
-
Computer Networks Topologies 11:06 11:06
-
Computer Networks Categories 09:47 09:47
-
Computer Networks Devices and Services 10:38 10:38
-
Computer Networks Transmission Media 09:19 09:19
ISO/OSI model(7 layers)
5 Lectures

TCP/IP protocol suite
5 Lectures

Wireless networks
5 Lectures

Computer networks security
5 Lectures

Firewalls and honeypots
5 Lectures

Intrusion detection and prevention systems(IDS/IPS)
5 Lectures

Wireless networks security
5 Lectures

Physical security and incident handling
5 Lectures

Computer networks security conclusion
5 Lectures

Instructor Details

Skills Marathon
Course Certificate
Use your certificate to make a career change or to advance in your current career.

Our students work
with the Best


































Related Video Courses
View MoreAnnual Membership
Become a valued member of Tutorials Point and enjoy unlimited access to our vast library of top-rated Video Courses
Subscribe now
Online Certifications
Master prominent technologies at full length and become a valued certified professional.
Explore Now