Computer Networking and Cyber Security

Computer Networking and Cyber Security

get Access To All 3500+ One Education Courses For Just £49/Year!
Claim Offer

Learning Outcome

Description

Become a trained professional from the safety and comfort of your own home by taking Computer Networking and Cyber Security . Whatever your situation and requirements, One Education can supply you with professional teaching, gained from industry experts, and brought to you for a great price with a limited-time discount. 

One Education has been proud to produce an extensive range of best-selling courses, and Computer Networking and Cyber Security is one of our best offerings. It is crafted specially to promote easy learning at any location with an online device. Each topic has been separated into digestible portions that can be memorised and understood in the minimum of time. 

Teaching and training are more than just a job for the staff at One Education; we take pride in employing those who share our vision for e-learning and its importance in today’s society. To prove this, all learning materials for each course are available for at least one year after the initial purchase.  

All of our tutors and IT help desk personnel are available to answer any questions regarding your training or any technical difficulties. 

By completing Computer Networking and Cyber Security, you will have automatically earnt an e-certificate that is industry-recognised and will be a great addition to your competencies on your CV.

Whatever your reason for studying Computer Networking and Cyber Security, make the most of this opportunity from One Education and excel in your chosen field.

Please be aware that there are no hidden fees, no sudden exam charges, and no other kind of unexpected payments. All costs will be made very clear before you even attempt to sign up.  

Course design

The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace.

You are taught through a combination of

  • Video lessons
  • Online study materials

Will I receive a certificate of completion?

Upon successful completion, you will qualify for the UK and internationally-recognised CPD accredited certification. You can choose to make your achievement formal by obtaining your PDF Certificate at the cost of £9 and Hard Copy Certificate for £15.

Why study this course

It doesn’t matter if you are an aspiring professional or absolute beginner; this course will enhance your expertise and boost your CV with critical skills and an accredited certification attesting to your knowledge.

The Computer Networking and Cyber Security is fully available to anyone, and no previous qualifications are needed to enrol. All One Education needs to know is that you are eager to learn and are over 16.

Course Curriculum

Section 01: Introduction to Cyber Security Masterclass Course
Course Introduction 00:04:00
Section 02: Complete Computer Networking for Cybersecurity and Ethical Hacking
What is a Network? 00:04:00
What is a Local Area Network? 00:03:00
Routers and LAN 00:03:00
Network Components 00:07:00
WAN and MPLS 00:06:00
Peer to Peer Network Architecture 00:04:00
Client-Server Network Architecture 00:04:00
Bus and Star Topology 00:06:00
Mesh and Ring Topology 00:05:00
Other Network Topologies that you should know! 00:08:00
Quick Recap 00:03:00
Introduction to Internetworking Models 00:03:00
Layered Approach and Advantages 00:05:00
Introduction to OSI Model 00:06:00
OSI Model: Application Layer 00:04:00
OSI Model: Presentation and Session Layer 00:02:00
OSI Model: Transport Layer 00:02:00
Connection Oriented vs Connectionless Service 00:06:00
What is Flow Control? 00:05:00
What is Windowing? 00:04:00
OSI Model: The Physical Layer 00:04:00
Quick Recap 00:04:00
What’s next? 00:02:00
What is a Coaxial Cable? 00:06:00
What is a Twisted Pair Cable? 00:03:00
What is Fibre Optic Cable? 00:06:00
Media Converters 00:05:00
UTP Categories 00:07:00
Different Wiring Standards 00:05:00
Straight Through Cable Type 00:05:00
Quick Recap 00:03:00
Welcome to Ethernet Specifications 00:02:00
Ethernet Basics 00:04:00
CSMA – CD Contention Method 00:04:00
Broadband – Baseband 00:04:00
Binary – Decimal Conversion 00:06:00
Ethernet Addressing 00:03:00
What are Ethernet Frames? 00:04:00
Ethernet at Physical Layer 00:02:00
IEEE 802.3 00:03:00
Quick Recap 00:01:00
Section 03: Networking Devices
Common Networking Devices 00:03:00
Network Interface Card (NIC) 00:02:00
Hub 00:04:00
Bridge 00:02:00
Switch 00:05:00
Router 00:05:00
Firewalls 00:05:00
IDS IPS HIDS 00:05:00
Access Points 00:03:00
Wireless Range Extenders 00:02:00
CSMA CA Introduction 00:04:00
CSMA CA Working 00:04:00
CSMA CD Introduction 00:02:00
CSMA CD Working 00:03:00
Introduction to DHCP Server 00:04:00
DHCP Operations 00:05:00
Introduction to Other devices 00:01:00
Multilayer Switch and Load Balancer 00:04:00
Introduction to DNS Server 00:05:00
DNS Record types 00:07:00
Types of DNS Servers 00:03:00
Proxy Servers 00:05:00
Encryption Devices 00:03:00
Analog Modems, Packet Shaper and VPN Concentrator 00:04:00
Media Converters and Next Generation Firewalls 00:02:00
Benefits of Routers 00:02:00
Quick Recap 00:04:00
Section 04: Getting Started with Cybersecurity!
What is Security? 00:06:00
What is Cybersecurity? 00:05:00
History of Cybersecurity 00:07:00
How to start a career in Cybersecurity? 00:06:00
Different Careers in Cybersecurity 00:10:00
Key Terms in Cyber Security 00:06:00
Elements of Information Security 00:07:00
Section 05: Fundamentals of Cybersecurity
Types of Actors 00:09:00
Passive Attacks in Cybersecurity 00:05:00
Active Attacks in Cybersecurity 00:05:00
Security Organizations 00:05:00
Section 06: Key Security Concepts
Security Architect’s View of Cybersecurity 00:06:00
Security Services and Mechanisms 00:06:00
Security Attacks! 00:07:00
Section 07: Cryptography - Securing your Data
What is Cryptography? 00:05:00
What is Symmetric Encryption? 00:03:00
AES and DES Standards in Cryptography 00:06:00
Asymmetric Encryption 00:03:00
Hashing 00:07:00
PKI and CA 00:10:00
RSA and Diffie Hellman Algorithms 00:07:00
What are Digital Signatures? 00:09:00
Transport Layer Security (TLS) Encryption 00:04:00
Generating Hashes using HashCal 00:04:00
Understanding Encryption and Decryption’ 00:05:00
Section 08: Introduction to Ethical Hacking
Hacking Terms 00:07:00
Vulnerability Assessment and Penetration Testing 00:09:00
Pentesting Methodologies 00:07:00
Types of Penetration Tests 00:06:00
Phases of Penetration Testing 00:04:00
10 Steps SECURITY EXPERTS follow! 00:04:00
Section 09: Setting up your own Penetration Testing Lab
What is Linux Operating System? 00:04:00
Have you heard of Kali Linux? 00:03:00
Installing Virtual Box 00:06:00
Installing KALI Linux in Virtual Box 00:12:00
Installing Metasploitable Machine in Virtual Box 00:09:00
Installing Damn Vulnerable Web Application (DVWA) in KALI Linux 00:18:00
Installing TOR Browser 00:09:00
Executing Linux Commands – Part 1 00:12:00
Executing Linux Commands – Part 2 00:14:00
Section 10: Information Gathering - Reconnaissance
What is Information Gathering? 00:08:00
Information Gathering using MALTEGO – Part 1 00:07:00
Information Gathering using MALTEGO – Part 2 00:06:00
Information Gathering using HTTRACK 00:05:00
Information Gathering using THE HARVESTER 00:02:00
Information Gathering using OSINT Framework 00:05:00
Information Gathering using NSLOOKUP 00:03:00
Information Gathering using REDHAWK 00:05:00
Information Gathering using SHODAN 00:09:00
Section 11: Scanning and Enumeration
What is Scanning? 00:07:00
What is NMAP Tool? 00:05:00
How to use Zenmap GUI? 00:17:00
What is Enumeration? 00:03:00
Types of Enumeration 00:03:00
Enumeration using Super Scan Tool 00:07:00
Enumeration Using Hyena Tool 00:06:00
Section 12: Vulnerability Assessment and Penetration Testing
What is Vulnerability Assessment? 00:04:00
Phases of Vulnerability Assessment 00:08:00
What are Vulnerability Scoring Systems? 00:09:00
Introduction to Nessus Tool 00:05:00
Create and Configure Network Scan using Nessus 00:08:00
Launching a Scan in Nessus Tool 00:08:00
Section 13: Firewall
What is an Intrusion Detection System? 00:11:00
What is a Firewall? 00:10:00
What is a Demilitarized Zone (DMZ)? 00:06:00
How to evade Intrusion Detection System? 00:08:00
How to evade Firewall? 00:09:00
Firewall Pentesting 00:02:00
Section 14: Web Application Penetration Testing
Introduction to Web Servers 00:05:00
Web Server Attacks 00:05:00
Web Server Penetration Testing 00:04:00
How to protect web servers from getting hacked? 00:05:00
OWASP Top 10 Vulnerabilities – Part 1 00:05:00
OWASP Top 10 Vulnerabilities – Part 2 00:07:00
Website Footprinting – Part 1 00:05:00
Website Footprinting – Part 2 00:03:00
Exploiting Basic Command Execution Vulnerability 00:06:00
Exploiting Basic Command Execution Vulnerability 00:07:00
How to configure Burp Suite? 00:16:00
Exploiting Basic File Upload Vulnerability 00:10:00
Exploiting Advance File Upload Vulnerability 00:07:00
Exploiting more advance File Upload Vulnerability 00:08:00
What is SQL Injection? 00:04:00
Types of SQL Injections 00:05:00
How to exploit SQL Injection manually? 00:17:00
Automating SQL Injection using SQLMap 00:09:00
How to prevent SQL Injection? 00:03:00
What is Cross Site Scripting (XSS) Vulnerability? 00:03:00
Types of Cross Site Scripting Vulnerability 00:06:00
Exploiting XSS vulnerability – Part 1 00:11:00
Exploiting XSS vulnerability – Part 2 00:05:00
Exploiting XSS vulnerability – Part 3 00:11:00
How to prevent XSS Attacks? 00:04:00
What is Cross Site Request Forgery (CSRF)? 00:06:00
Exploiting Cross Site Request Forgery Vulnerability 00:07:00
What is a Brute Force Attack? 00:05:00
Getting Usernames and Passwords using Brute Forcing 00:18:00
How to carry out a complete Web Application Penetration Test? 00:09:00
How to protect Web Applications? 00:06:00
Section 15: Denial of Service
What is Denial of Service? 00:03:00
Types of DOS Attacks? 00:05:00
What is a Botnet? 00:03:00
Section 16: Malware Threats
What is a Malware? 00:09:00
What are Trojans? 00:08:00
Types of Trojans 00:08:00
Introduction to Virus 00:07:00
Types of Virus 00:10:00
How to prevent against Malware? 00:07:00
Section 17: Social Engineering - The Art of Human Exploitation
What is Social Engineering? 00:05:00
Types of Social Engineering Techniques 00:06:00
Getting user credentials using BEEF – Part 1 00:09:00
Getting user credentials using BEEF – Part 2 00:11:00
Section 18: Writing a Penetration Testing Report
What is a Pentest Report? 00:08:00
Components of a Penetration Test Report 00:14:00
Assignment
Assignment -Computer Networking and Cyber Security 00:00:00
sidemoneyBack

COPYRIGHT © 2022 One Education

Home Search Cart
2
  • Item added to cart
  • Item added to cart
2
Your Cart
Contract Analyst

Placeholder
- +
£29
Get A PDF Certificate & Transcript After You Complete Your Course

Scholarship: Score 80% or more in your final exam to get this Fee refunded.

New Certificate On A Table
- +
£9.99

Upgrade to get UNLIMITED ACCESS to ALL COURSES for only £49/year

Claim Offer & Upgrade

Membership renews after 12 months. You can cancel anytime from your account.

Other Students Also Buy
    Apply Coupon