Introduction | |||
Introduction | 00:10:00 | ||
Section 01: An Introduction to Computer Networks | |||
1.1 Computer Network | 00:11:00 | ||
1.2 Computer Network Topologies | 00:11:00 | ||
1.3 Categories of Computer Network | 00:10:00 | ||
1.4 Computer Network Devices | 00:11:00 | ||
1.5 Transmission Media | 00:09:00 | ||
Section 02: ISO/OSI Model | |||
2.1 ISO/OSI Model | 00:10:00 | ||
2.2 Application, Presentation, and Session Layers | 00:12:00 | ||
2.3 Transport and Network Layers | 00:11:00 | ||
2.4 Data Link and Physical Layers | 00:09:00 | ||
2.5 ISO/OSI Model in Action | 00:10:00 | ||
Section 03: TCP/IP Protocols | |||
3.1 Introduction to Computer Networks Protocols | 00:11:00 | ||
3.2 IP Protocol | 00:13:00 | ||
3.3 TCP and UDP Protocols | 00:12:00 | ||
3.4 Application Protocols | 00:12:00 | ||
3.5 TCP/IP Characteristics and Tools | 00:11:00 | ||
Section 04: Wireless Networks | |||
4.1 Wireless Networks Benefits | 00:09:00 | ||
4.2 Types of Wireless Networks | 00:12:00 | ||
4.3 Wireless Networks Protocol (Wi-Fi) | 00:07:00 | ||
4.4 Wireless Networks Devices | 00:10:00 | ||
4.5 Wireless Networks Drawbacks | 00:09:00 | ||
Section 05: Network Security | |||
5.1 Security Goals | 00:09:00 | ||
5.2 Securing the Network Design | 00:10:00 | ||
5.3 TCP/IP Security and Tools | 00:12:00 | ||
5.4 Port Scanning and Tools | 00:11:00 | ||
5.5 Sniffing and Tools | 00:10:00 | ||
Section 06: Firewalls and Honeypots | |||
6.1 Reasons to Use Firewall | 00:13:00 | ||
6.2 Firewalls Rules | 00:11:00 | ||
6.3 Firewalls Filtering | 00:09:00 | ||
6.4 Honeypots | 00:07:00 | ||
6.5 Bypassing Firewalls | 00:08:00 | ||
Section 07: Intrusion Detection and Prevention System | |||
7.1 Intrusion Detection System: IDS | 00:11:00 | ||
7.2 Network IDS: NIDS | 00:06:00 | ||
7.3 NIDS Challenges | 00:09:00 | ||
7.4 Snort as NIDS | 00:08:00 | ||
7.5 Intrusion Prevention Systems: IPS | 00:07:00 | ||
Section 08: Wireless Network Security | |||
8.1 Wired Equivalent Privacy WEP Attacking | 00:11:00 | ||
8.2 WPA and AES Protocols | 00:09:00 | ||
8.3 Wireless Security Misconceptions | 00:09:00 | ||
8.4 Wireless Attacks and Mitigation | 00:09:00 | ||
8.5 Secure Network Design with Wireless | 00:09:00 | ||
Section 09: Physical Security and Incident Handling | |||
9.1 Physical Security Objectives | 00:11:00 | ||
9.2 Physical Threats and Mitigation | 00:11:00 | ||
9.3 Defense in Depth (DiD) | 00:07:00 | ||
9.4 Incident | 00:06:00 | ||
9.5 Incident Handling | 00:14:00 | ||
Section 10: Network Security: Conclusion | |||
10.1 Confidentiality, Integrity, and Availability (CIA) | 00:06:00 | ||
10.2 Assets, Threats, and Vulnerabilities | 00:04:00 | ||
10.3 Risks and Network Intrusion | 00:06:00 | ||
10.4 Common Attacks | 00:09:00 | ||
10.5 Security Recommendations | 00:06:00 | ||
Assignment | |||
Assignment -Computer Networks Security from Scratch to Advanced | 00:00:00 |
Review: Hi Charlie, We appreciate your valuable feedback. We are glad to know that you have enjoyed our course. Thank you for your excellent review. Regards, One Education
Review: Hi Kirsten, Thanks for leaving us such a wonderful review. We are thrilled that you loved your experience with One Education. We put learner experience and satisfaction as our priority, and your review reaffirms the hard work we put in every day. We look forward to seeing you again. Regards, One Education
Review: Hi Eleanor, We appreciate your valuable feedback. We are glad to know that you have enjoyed our course. Thanks for your excellent review. Regards, One Education
Review: Hi Sienna, Thank you for your amazing feedback. We are glad that you had a pleasant experience with our support team. Regards, One Education
Review: Hi Rachel, Thank you for sharing your excellent feedback. We hope to serve you again. Regards, One Education
Upgrade to get UNLIMITED ACCESS to ALL COURSES for only £49/year
Claim Offer & UpgradeMembership renews after 12 months. You can cancel anytime from your account.