Introduction |
|
Introduction |
|
00:10:00 |
Section 01: An Introduction to Computer Networks |
|
1.1 Computer Network |
|
00:11:00 |
|
1.2 Computer Network Topologies |
|
00:11:00 |
|
1.3 Categories of Computer Network |
|
00:10:00 |
|
1.4 Computer Network Devices |
|
00:11:00 |
|
1.5 Transmission Media |
|
00:09:00 |
Section 02: ISO/OSI Model |
|
2.1 ISO/OSI Model |
|
00:10:00 |
|
2.2 Application, Presentation, and Session Layers |
|
00:12:00 |
|
2.3 Transport and Network Layers |
|
00:11:00 |
|
2.4 Data Link and Physical Layers |
|
00:09:00 |
|
2.5 ISO/OSI Model in Action |
|
00:10:00 |
Section 03: TCP/IP Protocols |
|
3.1 Introduction to Computer Networks Protocols |
|
00:11:00 |
|
3.2 IP Protocol |
|
00:13:00 |
|
3.3 TCP and UDP Protocols |
|
00:12:00 |
|
3.4 Application Protocols |
|
00:12:00 |
|
3.5 TCP/IP Characteristics and Tools |
|
00:11:00 |
Section 04: Wireless Networks |
|
4.1 Wireless Networks Benefits |
|
00:09:00 |
|
4.2 Types of Wireless Networks |
|
00:12:00 |
|
4.3 Wireless Networks Protocol (Wi-Fi) |
|
00:07:00 |
|
4.4 Wireless Networks Devices |
|
00:10:00 |
|
4.5 Wireless Networks Drawbacks |
|
00:09:00 |
Section 05: Network Security |
|
5.1 Security Goals |
|
00:09:00 |
|
5.2 Securing the Network Design |
|
00:10:00 |
|
5.3 TCP/IP Security and Tools |
|
00:12:00 |
|
5.4 Port Scanning and Tools |
|
00:11:00 |
|
5.5 Sniffing and Tools |
|
00:10:00 |
Section 06: Firewalls and Honeypots |
|
6.1 Reasons to Use Firewall |
|
00:13:00 |
|
6.2 Firewalls Rules |
|
00:11:00 |
|
6.3 Firewalls Filtering |
|
00:09:00 |
|
6.4 Honeypots |
|
00:07:00 |
|
6.5 Bypassing Firewalls |
|
00:08:00 |
Section 07: Intrusion Detection and Prevention System |
|
7.1 Intrusion Detection System: IDS |
|
00:11:00 |
|
7.2 Network IDS: NIDS |
|
00:06:00 |
|
7.3 NIDS Challenges |
|
00:09:00 |
|
7.4 Snort as NIDS |
|
00:08:00 |
|
7.5 Intrusion Prevention Systems: IPS |
|
00:07:00 |
Section 08: Wireless Network Security |
|
8.1 Wired Equivalent Privacy WEP Attacking |
|
00:11:00 |
|
8.2 WPA and AES Protocols |
|
00:09:00 |
|
8.3 Wireless Security Misconceptions |
|
00:09:00 |
|
8.4 Wireless Attacks and Mitigation |
|
00:09:00 |
|
8.5 Secure Network Design with Wireless |
|
00:09:00 |
Section 09: Physical Security and Incident Handling |
|
9.1 Physical Security Objectives |
|
00:11:00 |
|
9.2 Physical Threats and Mitigation |
|
00:11:00 |
|
9.3 Defense in Depth (DiD) |
|
00:07:00 |
|
9.4 Incident |
|
00:06:00 |
|
9.5 Incident Handling |
|
00:14:00 |
Section 10: Network Security: Conclusion |
|
10.1 Confidentiality, Integrity, and Availability (CIA) |
|
00:06:00 |
|
10.2 Assets, Threats, and Vulnerabilities |
|
00:04:00 |
|
10.3 Risks and Network Intrusion |
|
00:06:00 |
|
10.4 Common Attacks |
|
00:09:00 |
|
10.5 Security Recommendations |
|
00:06:00 |
Assignment |
|
Assignment -Computer Networks Security from Scratch to Advanced |
|
00:00:00 |