Library

Course: Computer Networks Security from Scratch to Advanced

Computer Networks Security from Scratch to Advanced

  • Life Time Access
  • Certificate on Completion
  • Access on Android and iOS App
About this Course

By the end of this course you will be fully aware of the wired and wireless computer networks basics, devices, and protocols in a step-by-step pace. You will also reach the professional level in networks security in terms of concepts, technologies, and tools. The course requires no background or pre-requisite, yet you will be able to understand all the up-to-date terminologies in the networks security during the lectures.

This course covers the following sections:

Section One: introduction to Computer Networks

  • Lecture 1: What is a Computer Network?
  • Lecture 2: Computer Networks Topologies
  • Lecture 3: Computer Networks Categories
  • Lecture 4: Computer Networks Devices and Services
  • Lecture 5: Computer Networks Transmission Media

Section Two: ISO/OSI Model (7 Layers)

  • Lecture 1: Why ISO/OSI Model?
  • Lecture 2: Application, Presentation, and Session Layers
  • Lecture 3: Transport and Network Layers
  • Lecture 4: Data Link and Physical Layers
  • Lecture 5: ISO/OSI Model in Action

Section Three: TCP/IP Protocol Suite

  • Lecture 1: Introduction to Computer Networks Protocols
  • Lecture 2: IP Protocol
  • Lecture 3: TCP and UDP Protocols
  • Lecture 4: Application Protocols
  • Lecture 5: TCP/IP Characteristics and Tools

Section Four: Wireless Networks

  • Lecture 1: Wireless Networks Benefits
  • Lecture 2: Wireless Networks Types
  • Lecture 3: Wireless Networks Protocol (Wi-Fi)
  • Lecture 4: Wireless Networks Devices
  • Lecture 5: Wireless Networks Drawbacks

Section Five: Computer Networks Security

  • Lecture 1: Security Goals
  • Lecture 2: Securing the Network Design
  • Lecture 3: TCP/IP Security and Tools
  • Lecture 4: Port Scanning and Tools
  • Lecture 5: Sniffing and Tools

Section Six: Firewalls and Honeypots

  • Lecture 1: Why Using a Firewall?
  • Lecture 2: Firewalls Rules
  • Lecture 3: Firewalls Filtering
  • Lecture 4: Honey Pots
  • Lecture 5: Bypassing Firewalls

Section Seven: Intrusion Detection and Prevention systems (IDS/IPS)

  • Lecture 1: What is Intrusion Detection Systems (IDS)?
  • Lecture 2: Network IDS (NIDS)
  • Lecture 3: NIDS Challenges
  • Lecture 4: Snort as NIDS
  • Lecture 5: Intrusion Prevention Systems (IPS)

Section Eight: Wireless Networks Security

  • Lecture 1: Wired Equivalent Privacy WEP Attacking
  • Lecture 2: WPA and AES Protocols
  • Lecture 3: Wireless Security Misconceptions
  • Lecture 4: Wireless Attacks and Mitigation
  • Lecture 5: Secure Network Design with Wireless

Section Nine: Physical Security & Incident Handling

  • Lecture 1: Physical Security Objectives
  • Lecture 2: Physical Threats and Mitigation
  • Lecture 3: Defense in Depth (DiD)
  • Lecture 4: What is an Incident?
  • Lecture 5: Incident Handling

Section Ten: Computer Networks Security Conclusion

  • Lecture 1: Confidentiality, Integrity, and Availability (CIA)
  • Lecture 2: Assets, Threats, and Vulnerabilities
  • Lecture 3: Risks and Network Intrusion
  • Lecture 4: Common Attacks
  • Lecture 5: Security Recommendations

Who is the target audience?

  • Network administrators
  • Cyber security officers
  • Computer science undergraduates
  • Computer engineering undergraduates
  • Network security postgraduates
  • Network technical support specialists
  • Security incident handlers
  • IT Engineers and CEOs
  • Software Developers
  • Web Developers
  • Mobile Applications Developers
Basic knowledge
  • Basic computer knowledge
  • Basic Internet skills and adequate connection
  • Beginner networking background
  • Microsoft Windows machine
  • Microsoft Power Point for the presentation material
  • Beginner cyber security information
  • Laptop machine and standard browser
What you will learn
  • Introduction to Computer Networks
  • ISO/OSI Model (7 Layers)
  • TCP/IP Protocol Suite
  • Wireless Networks
  • Computer Networks Security
  • Firewalls and Honeypots
  • Intrusion Detection and Prevention systems (IDS/IPS)
  • Wireless Networks Security
  • Physical Security & Incident Handling
  • Computer Networks Security Recommendations
Curriculum
Lectures quantity: 50
Common duration: 07:55:14
Introduction to Computer Networks
  • What is a Computer Network?  

    Computer networks definition and components

  • Computer Networks Topologies  

    Bus, star, and mesh topologies

  • Computer Networks Categories  

    Categorizing networks according to mode, area, and administration

  • Computer Networks Devices and Services  

    Switches, routers, and NICs

  • Computer Networks Transmission Media  

    Wired and wireless media

ISO/OSI Model
  • Why ISO/OSI Model?  

    The reason of dividing the ISO/OSI model into 7 layers

  • Application, Presentation, and Session Layers  

    The description of application, presentation, and session layers

  • Transport and Network Layers  

    The description of the transport and network layers

  • Data-link and Physical Layers  

    The description of the data-link and physical layers

  • ISO/OSI Model in Action  

    Data transition across the 7 layers

TCP/IP Protocol Suite
  • Introduction to Computer Networks Protocols  

    The concept of a protocol and some examples and usage

  • IP Protocol  

    IP protocol and IP address structutre and classes

  • TCP and UDP Protocols  

    Differentiating between TCP and UDP protocols

  • Application Protocols  

    HTTP, FTP, DNS, and others as application protocols

  • TCP/IP Lab  

    Using TCP/IP commands and tools

Wireless Networks
  • Why Wireless Networking?  

    The benefits of wireless networks over wired and the drawbacks

  • Wireless Networks Types  

    Describing the technologies of wireless networks

  • Wireless Networks Protocol (Wi-Fi)  

    Explaining the Wi-Fi protocol layers and action

  • Wireless Network Devices  

    Demonstrating the Access Point functionality and the wireless NICs

  • Wireless Networks Drawbacks  

    The drawbacks of networking using wireless technologies and some review questions

Computer Networks Security
  • Security Goals and Concepts  

    CIA concept and other security terms

  • Securing Network Design  

    Applying security on network from the time of its design

  • Security of TCP/IP and Tools  

    Tools to secure the TCP/IP packets and traffic

  • Port Scanning  

    Tools and concept of port scanning

  • Sniffing and Tools  

    Tools and concept of network sniffing

Firewalls and Honeypots
  • Why using Firewall?  

    Benefits of using firewalls

  • Firewall Rules  

    Configuring rules of firewall

  • Firewall Filtering  

    How the firewall filters incoming and outgoing traffic?

  • Honeypots  

    The concept and usage of honeypot

  • Bypassing Firewall and Tools  

    How to bypass the firewall and the used tools

IDS and IPS
  • What is IDS  

    The concept of intrusion detection systems

  • Network IDS  

    The technology of network IDS and tools

  • Network IDS Challenges  

    Where to place the network IDS and its configuration

  • Snort as IDS  

    Understanding and configuring Snort

  • IPS  

    Demonstrating the intrusion prevention systems and its configuration

Wireless Networks Security
  • WEP  

    Wired equivalent privacy algorithm and others

  • WPA and AES  

    Using WPA1 and WPA2 with AES

  • Wireless Security Misconceptions  

    Faults and challenges of wireless security

  • Wireless Attacks and Mitigation  

    The most common wireless attacks and their ways of mitigation

  • Secure Wireless Design  

    Designing the network with the wireless section

Physical Security and Incident Handling
  • Physical Security Objectives  

    Safety and physical threats mitigation

  • Physical Security Threats and Mitigation  

    The threats of physical security and ways of mitigation

  • Defense in Depth  

    Layers of securing the IT system

  • What is an Incident?  

    The definition of event and incident

  • Incident Handling and Response  

    Handling and responding to an incident

Computer Networks Security Conclusion
  • CIA  

    The concept of confidentiality, integrity, and availability

  • Assets, Threats, and Vulnerabilities  

    Explaining the risk output from threats

  • Risk and Network Intrusion  

    The risk definition and intrusion of network types

  • Common Attacks  

    The most common attacks to network security

  • Security Recommendations  

    Recommendations to achieve network security

Reviews (0)