Library

Course: Computer Networks Security from Scratch to Advanced

Computer Networks Security from Scratch to Advanced

  • Life Time Access
  • Certificate on Completion
  • Access on Android and iOS App
  • Self-Paced
About this Course

By the end of this course you will be fully aware of the wired and wireless computer networks basics, devices, and protocols in a step-by-step pace. You will also reach the professional level in networks security in terms of concepts, technologies, and tools. The course requires no background or pre-requisite, yet you will be able to understand all the up-to-date terminologies in the networks security during the lectures.

This course covers the following sections:

Section One: introduction to Computer Networks

  • Lecture 1: What is a Computer Network?
  • Lecture 2: Computer Networks Topologies
  • Lecture 3: Computer Networks Categories
  • Lecture 4: Computer Networks Devices and Services
  • Lecture 5: Computer Networks Transmission Media

Section Two: ISO/OSI Model (7 Layers)

  • Lecture 1: Why ISO/OSI Model?
  • Lecture 2: Application, Presentation, and Session Layers
  • Lecture 3: Transport and Network Layers
  • Lecture 4: Data Link and Physical Layers
  • Lecture 5: ISO/OSI Model in Action

Section Three: TCP/IP Protocol Suite

  • Lecture 1: Introduction to Computer Networks Protocols
  • Lecture 2: IP Protocol
  • Lecture 3: TCP and UDP Protocols
  • Lecture 4: Application Protocols
  • Lecture 5: TCP/IP Characteristics and Tools

Section Four: Wireless Networks

  • Lecture 1: Wireless Networks Benefits
  • Lecture 2: Wireless Networks Types
  • Lecture 3: Wireless Networks Protocol (Wi-Fi)
  • Lecture 4: Wireless Networks Devices
  • Lecture 5: Wireless Networks Drawbacks

Section Five: Computer Networks Security

  • Lecture 1: Security Goals
  • Lecture 2: Securing the Network Design
  • Lecture 3: TCP/IP Security and Tools
  • Lecture 4: Port Scanning and Tools
  • Lecture 5: Sniffing and Tools

Section Six: Firewalls and Honeypots

  • Lecture 1: Why Using a Firewall?
  • Lecture 2: Firewalls Rules
  • Lecture 3: Firewalls Filtering
  • Lecture 4: Honey Pots
  • Lecture 5: Bypassing Firewalls

Section Seven: Intrusion Detection and Prevention systems (IDS/IPS)

  • Lecture 1: What is Intrusion Detection Systems (IDS)?
  • Lecture 2: Network IDS (NIDS)
  • Lecture 3: NIDS Challenges
  • Lecture 4: Snort as NIDS
  • Lecture 5: Intrusion Prevention Systems (IPS)

Section Eight: Wireless Networks Security

  • Lecture 1: Wired Equivalent Privacy WEP Attacking
  • Lecture 2: WPA and AES Protocols
  • Lecture 3: Wireless Security Misconceptions
  • Lecture 4: Wireless Attacks and Mitigation
  • Lecture 5: Secure Network Design with Wireless

Section Nine: Physical Security & Incident Handling

  • Lecture 1: Physical Security Objectives
  • Lecture 2: Physical Threats and Mitigation
  • Lecture 3: Defense in Depth (DiD)
  • Lecture 4: What is an Incident?
  • Lecture 5: Incident Handling

Section Ten: Computer Networks Security Conclusion

  • Lecture 1: Confidentiality, Integrity, and Availability (CIA)
  • Lecture 2: Assets, Threats, and Vulnerabilities
  • Lecture 3: Risks and Network Intrusion
  • Lecture 4: Common Attacks
  • Lecture 5: Security Recommendations

Who is the target audience?

  • Network administrators
  • Cyber security officers
  • Computer science undergraduates
  • Computer engineering undergraduates
  • Network security postgraduates
  • Network technical support specialists
  • Security incident handlers
  • IT Engineers and CEOs
  • Software Developers
  • Web Developers
  • Mobile Applications Developers
Basic knowledge
  • Basic computer knowledge
  • Basic Internet skills and adequate connection
  • Beginner networking background
  • Microsoft Windows machine
  • Microsoft Power Point for the presentation material
  • Beginner cyber security information
  • Laptop machine and standard browser
What you will learn
  • Introduction to Computer Networks
  • ISO/OSI Model (7 Layers)
  • TCP/IP Protocol Suite
  • Wireless Networks
  • Computer Networks Security
  • Firewalls and Honeypots
  • Intrusion Detection and Prevention systems (IDS/IPS)
  • Wireless Networks Security
  • Physical Security & Incident Handling
  • Computer Networks Security Recommendations
Curriculum
Number of Lectures: 50
Total Duration: 07:55:14
Introduction to Computer Networks
  • What is a Computer Network?  

    Computer networks definition and components

  • Computer Networks Topologies  

    Bus, star, and mesh topologies

  • Computer Networks Categories  

    Categorizing networks according to mode, area, and administration

  • Computer Networks Devices and Services  

    Switches, routers, and NICs

  • Computer Networks Transmission Media  

    Wired and wireless media

ISO/OSI Model
  • Why ISO/OSI Model?  

    The reason of dividing the ISO/OSI model into 7 layers

  • Application, Presentation, and Session Layers  

    The description of application, presentation, and session layers

  • Transport and Network Layers  

    The description of the transport and network layers

  • Data-link and Physical Layers  

    The description of the data-link and physical layers

  • ISO/OSI Model in Action  

    Data transition across the 7 layers

TCP/IP Protocol Suite
  • Introduction to Computer Networks Protocols  

    The concept of a protocol and some examples and usage

  • IP Protocol  

    IP protocol and IP address structutre and classes

  • TCP and UDP Protocols  

    Differentiating between TCP and UDP protocols

  • Application Protocols  

    HTTP, FTP, DNS, and others as application protocols

  • TCP/IP Lab  

    Using TCP/IP commands and tools

Wireless Networks
  • Why Wireless Networking?  

    The benefits of wireless networks over wired and the drawbacks

  • Wireless Networks Types  

    Describing the technologies of wireless networks

  • Wireless Networks Protocol (Wi-Fi)  

    Explaining the Wi-Fi protocol layers and action

  • Wireless Network Devices  

    Demonstrating the Access Point functionality and the wireless NICs

  • Wireless Networks Drawbacks  

    The drawbacks of networking using wireless technologies and some review questions

Computer Networks Security
  • Security Goals and Concepts  

    CIA concept and other security terms

  • Securing Network Design  

    Applying security on network from the time of its design

  • Security of TCP/IP and Tools  

    Tools to secure the TCP/IP packets and traffic

  • Port Scanning  

    Tools and concept of port scanning

  • Sniffing and Tools  

    Tools and concept of network sniffing

Firewalls and Honeypots
  • Why using Firewall?  

    Benefits of using firewalls

  • Firewall Rules  

    Configuring rules of firewall

  • Firewall Filtering  

    How the firewall filters incoming and outgoing traffic?

  • Honeypots  

    The concept and usage of honeypot

  • Bypassing Firewall and Tools  

    How to bypass the firewall and the used tools

IDS and IPS
  • What is IDS  

    The concept of intrusion detection systems

  • Network IDS  

    The technology of network IDS and tools

  • Network IDS Challenges  

    Where to place the network IDS and its configuration

  • Snort as IDS  

    Understanding and configuring Snort

  • IPS  

    Demonstrating the intrusion prevention systems and its configuration

Wireless Networks Security
  • WEP  

    Wired equivalent privacy algorithm and others

  • WPA and AES  

    Using WPA1 and WPA2 with AES

  • Wireless Security Misconceptions  

    Faults and challenges of wireless security

  • Wireless Attacks and Mitigation  

    The most common wireless attacks and their ways of mitigation

  • Secure Wireless Design  

    Designing the network with the wireless section

Physical Security and Incident Handling
  • Physical Security Objectives  

    Safety and physical threats mitigation

  • Physical Security Threats and Mitigation  

    The threats of physical security and ways of mitigation

  • Defense in Depth  

    Layers of securing the IT system

  • What is an Incident?  

    The definition of event and incident

  • Incident Handling and Response  

    Handling and responding to an incident

Computer Networks Security Conclusion
  • CIA  

    The concept of confidentiality, integrity, and availability

  • Assets, Threats, and Vulnerabilities  

    Explaining the risk output from threats

  • Risk and Network Intrusion  

    The risk definition and intrusion of network types

  • Common Attacks  

    The most common attacks to network security

  • Security Recommendations  

    Recommendations to achieve network security

Reviews (0)