Course Highlights
Network security protects computer networks from unauthorized access, use, disclosure, disruption, modification, or destruction. It is a complex and ever-evolving field, but it is essential for any organization that relies on computer networks to operate.
This course will provide a comprehensive overview of computer network security, from networking basics to the latest security threats and countermeasures. You will learn about the different types of attacks that can be launched against computer networks, as well as the various security technologies and strategies that can be used to protect them.
Whether a beginner or an experienced IT professional, this course will give you the knowledge and skills to secure your computer networks and protect your data.
As you progress, you’ll navigate the meticulously structured layers of the ISO/OSI Model, understand the universality of TCP/IP Protocols, and delve into the freedom of Wireless Networks. But with great freedom comes great responsibility. Hence, as the course advances, the spotlight shifts to the critical aspects of Network Security. From erecting formidable Firewalls to setting up deceptive Honeypots, from discerning breaches with Intrusion Detection to proactively fending off threats with Prevention Systems—the training equips you for it all.
By reaching the concluding sections, you’ll be adept at safeguarding even the most vulnerable facets of a network. You’ll be prepared for every eventuality with a module dedicated to Physical Security and Incident Handling. Whether you’re looking to bolster your professional trajectory or simply yearn to secure your personal space in the vastness of the internet, this comprehensive training is your blueprint.
Learning outcome
- Understand the fundamentals of computer networks and network security
- Identify and assess common network security threats
- Implement and configure effective network security controls
- Monitor and manage network security
- Respond to and recover from network security incidents
- Develop and maintain a comprehensive network security program
- Prepare for a career in network security
Course media
Why should I take this course?
- Master the complexities of computer networks.
- Stay ahead in the evolving world of cyber threats.
- Equip yourself with skills desired by top tech firms.
- Boost your credibility in the IT sector.
- Ensure data safety in professional and personal domains.
Career Path
- Network Security Engineer
- Network Administrator
- Security Analyst
- Penetration Tester
- Security Consultant
- IT Auditor
- Wireless Network Security Specialist
- Incident Response Analyst
Requirements
- Basic understanding of computers and networking
- Access to a computer with an internet connection
- Willingness to learn and apply new skills
Course Curriculum
-
Introduction
00:10:00
-
1.1 Computer Network
00:11:00
-
1.2 Computer Network Topologies
00:11:00
-
1.3 Categories of Computer Network
00:10:00
-
1.4 Computer Network Devices
00:11:00
-
1.5 Transmission Media
00:09:00
-
2.1 ISO/OSI Model
00:10:00
-
2.2 Application, Presentation, and Session Layers
00:12:00
-
2.3 Transport and Network Layers
00:11:00
-
2.4 Data Link and Physical Layers
00:09:00
-
2.5 ISO/OSI Model in Action
00:10:00
-
3.1 Introduction to Computer Networks Protocols
00:11:00
-
3.2 IP Protocol
00:13:00
-
3.3 TCP and UDP Protocols
00:12:00
-
3.4 Application Protocols
00:12:00
-
3.5 TCP/IP Characteristics and Tools
00:11:00
-
4.1 Wireless Networks Benefits
00:09:00
-
4.2 Types of Wireless Networks
00:12:00
-
4.3 Wireless Networks Protocol (Wi-Fi)
00:07:00
-
4.4 Wireless Networks Devices
00:10:00
-
4.5 Wireless Networks Drawbacks
00:09:00
-
5.1 Security Goals
00:09:00
-
5.2 Securing the Network Design
00:10:00
-
5.3 TCP/IP Security and Tools
00:12:00
-
5.4 Port Scanning and Tools
00:11:00
-
5.5 Sniffing and Tools
00:10:00
-
6.1 Reasons to Use Firewall
00:13:00
-
6.2 Firewalls Rules
00:11:00
-
6.3 Firewalls Filtering
00:09:00
-
6.4 Honeypots
00:07:00
-
6.5 Bypassing Firewalls
00:08:00
-
7.1 Intrusion Detection System: IDS
00:11:00
-
7.2 Network IDS: NIDS
00:06:00
-
7.3 NIDS Challenges
00:09:00
-
7.4 Snort as NIDS
00:08:00
-
7.5 Intrusion Prevention Systems: IPS
00:07:00
-
8.1 Wired Equivalent Privacy WEP Attacking
00:11:00
-
8.2 WPA and AES Protocols
00:09:00
-
8.3 Wireless Security Misconceptions
00:09:00
-
8.4 Wireless Attacks and Mitigation
00:09:00
-
8.5 Secure Network Design with Wireless
00:09:00
-
9.1 Physical Security Objectives
00:11:00
-
9.2 Physical Threats and Mitigation
00:11:00
-
9.3 Defense in Depth (DiD)
00:07:00
-
9.4 Incident
00:06:00
-
9.5 Incident Handling
00:14:00
-
10.1 Confidentiality, Integrity, and Availability (CIA)
00:06:00
-
10.2 Assets, Threats, and Vulnerabilities
00:04:00
-
10.3 Risks and Network Intrusion
00:06:00
-
10.4 Common Attacks
00:09:00
-
10.5 Security Recommendations
00:06:00
-
Assignment – Computer Network Security Complete Training
Offer Ends in

-
Duration:8 hours, 8 minutes
-
Access:1 Year
-
Units:52

