| Introduction | |||
| Introduction | 00:10:00 | ||
| Section 01: An Introduction to Computer Networks | |||
| 1.1 Computer Network | 00:11:00 | ||
| 1.2 Computer Network Topologies | 00:11:00 | ||
| 1.3 Categories of Computer Network | 00:10:00 | ||
| 1.4 Computer Network Devices | 00:11:00 | ||
| 1.5 Transmission Media | 00:09:00 | ||
| Section 02: ISO/OSI Model | |||
| 2.1 ISO/OSI Model | 00:10:00 | ||
| 2.2 Application, Presentation, and Session Layers | 00:12:00 | ||
| 2.3 Transport and Network Layers | 00:11:00 | ||
| 2.4 Data Link and Physical Layers | 00:09:00 | ||
| 2.5 ISO/OSI Model in Action | 00:10:00 | ||
| Section 03: TCP/IP Protocols | |||
| 3.1 Introduction to Computer Networks Protocols | 00:11:00 | ||
| 3.2 IP Protocol | 00:13:00 | ||
| 3.3 TCP and UDP Protocols | 00:12:00 | ||
| 3.4 Application Protocols | 00:12:00 | ||
| 3.5 TCP/IP Characteristics and Tools | 00:11:00 | ||
| Section 04: Wireless Networks | |||
| 4.1 Wireless Networks Benefits | 00:09:00 | ||
| 4.2 Types of Wireless Networks | 00:12:00 | ||
| 4.3 Wireless Networks Protocol (Wi-Fi) | 00:07:00 | ||
| 4.4 Wireless Networks Devices | 00:10:00 | ||
| 4.5 Wireless Networks Drawbacks | 00:09:00 | ||
| Section 05: Network Security | |||
| 5.1 Security Goals | 00:09:00 | ||
| 5.2 Securing the Network Design | 00:10:00 | ||
| 5.3 TCP/IP Security and Tools | 00:12:00 | ||
| 5.4 Port Scanning and Tools | 00:11:00 | ||
| 5.5 Sniffing and Tools | 00:10:00 | ||
| Section 06: Firewalls and Honeypots | |||
| 6.1 Reasons to Use Firewall | 00:13:00 | ||
| 6.2 Firewalls Rules | 00:11:00 | ||
| 6.3 Firewalls Filtering | 00:09:00 | ||
| 6.4 Honeypots | 00:07:00 | ||
| 6.5 Bypassing Firewalls | 00:08:00 | ||
| Section 07: Intrusion Detection and Prevention System | |||
| 7.1 Intrusion Detection System: IDS | 00:11:00 | ||
| 7.2 Network IDS: NIDS | 00:06:00 | ||
| 7.3 NIDS Challenges | 00:09:00 | ||
| 7.4 Snort as NIDS | 00:08:00 | ||
| 7.5 Intrusion Prevention Systems: IPS | 00:07:00 | ||
| Section 08: Wireless Network Security | |||
| 8.1 Wired Equivalent Privacy WEP Attacking | 00:11:00 | ||
| 8.2 WPA and AES Protocols | 00:09:00 | ||
| 8.3 Wireless Security Misconceptions | 00:09:00 | ||
| 8.4 Wireless Attacks and Mitigation | 00:09:00 | ||
| 8.5 Secure Network Design with Wireless | 00:09:00 | ||
| Section 09: Physical Security and Incident Handling | |||
| 9.1 Physical Security Objectives | 00:11:00 | ||
| 9.2 Physical Threats and Mitigation | 00:11:00 | ||
| 9.3 Defense in Depth (DiD) | 00:07:00 | ||
| 9.4 Incident | 00:06:00 | ||
| 9.5 Incident Handling | 00:14:00 | ||
| Section 10: Network Security: Conclusion | |||
| 10.1 Confidentiality, Integrity, and Availability (CIA) | 00:06:00 | ||
| 10.2 Assets, Threats, and Vulnerabilities | 00:04:00 | ||
| 10.3 Risks and Network Intrusion | 00:06:00 | ||
| 10.4 Common Attacks | 00:09:00 | ||
| 10.5 Security Recommendations | 00:06:00 | ||
| Assignment | |||
| Assignment -Computer Networks Security from Scratch to Advanced | 00:00:00 | ||