Course Highlights
Network security protects computer networks from unauthorized access, use, disclosure, disruption, modification, or destruction. It is a complex and ever-evolving field, but it is essential for any organization that relies on computer networks to operate.
This course will provide a comprehensive overview of computer network security, from networking basics to the latest security threats and countermeasures. You will learn about the different types of attacks that can be launched against computer networks, as well as the various security technologies and strategies that can be used to protect them.
Whether a beginner or an experienced IT professional, this course will give you the knowledge and skills to secure your computer networks and protect your data.
As you progress, you’ll navigate the meticulously structured layers of the ISO/OSI Model, understand the universality of TCP/IP Protocols, and delve into the freedom of Wireless Networks. But with great freedom comes great responsibility. Hence, as the course advances, the spotlight shifts to the critical aspects of Network Security. From erecting formidable Firewalls to setting up deceptive Honeypots, from discerning breaches with Intrusion Detection to proactively fending off threats with Prevention Systems—the training equips you for it all.
By reaching the concluding sections, you’ll be adept at safeguarding even the most vulnerable facets of a network. You’ll be prepared for every eventuality with a module dedicated to Physical Security and Incident Handling. Whether you’re looking to bolster your professional trajectory or simply yearn to secure your personal space in the vastness of the internet, this comprehensive training is your blueprint.
Learning outcome
- Understand the fundamentals of computer networks and network security
- Identify and assess common network security threats
- Implement and configure effective network security controls
- Monitor and manage network security
- Respond to and recover from network security incidents
- Develop and maintain a comprehensive network security program
- Prepare for a career in network security
Course media
Why should I take this course?
- Master the complexities of computer networks.
- Stay ahead in the evolving world of cyber threats.
- Equip yourself with skills desired by top tech firms.
- Boost your credibility in the IT sector.
- Ensure data safety in professional and personal domains.
Career Path
- Network Security Engineer
- Network Administrator
- Security Analyst
- Penetration Tester
- Security Consultant
- IT Auditor
- Wireless Network Security Specialist
- Incident Response Analyst
Requirements
- Basic understanding of computers and networking
- Access to a computer with an internet connection
- Willingness to learn and apply new skills
Course Curriculum
-
Introduction00:10:00
-
1.1 Computer Network00:11:00
-
1.2 Computer Network Topologies00:11:00
-
1.3 Categories of Computer Network00:10:00
-
1.4 Computer Network Devices00:11:00
-
1.5 Transmission Media00:09:00
-
2.1 ISO/OSI Model00:10:00
-
2.2 Application, Presentation, and Session Layers00:12:00
-
2.3 Transport and Network Layers00:11:00
-
2.4 Data Link and Physical Layers00:09:00
-
2.5 ISO/OSI Model in Action00:10:00
-
3.1 Introduction to Computer Networks Protocols00:11:00
-
3.2 IP Protocol00:13:00
-
3.3 TCP and UDP Protocols00:12:00
-
3.4 Application Protocols00:12:00
-
3.5 TCP/IP Characteristics and Tools00:11:00
-
4.1 Wireless Networks Benefits00:09:00
-
4.2 Types of Wireless Networks00:12:00
-
4.3 Wireless Networks Protocol (Wi-Fi)00:07:00
-
4.4 Wireless Networks Devices00:10:00
-
4.5 Wireless Networks Drawbacks00:09:00
-
5.1 Security Goals00:09:00
-
5.2 Securing the Network Design00:10:00
-
5.3 TCP/IP Security and Tools00:12:00
-
5.4 Port Scanning and Tools00:11:00
-
5.5 Sniffing and Tools00:10:00
-
6.1 Reasons to Use Firewall00:13:00
-
6.2 Firewalls Rules00:11:00
-
6.3 Firewalls Filtering00:09:00
-
6.4 Honeypots00:07:00
-
6.5 Bypassing Firewalls00:08:00
-
7.1 Intrusion Detection System: IDS00:11:00
-
7.2 Network IDS: NIDS00:06:00
-
7.3 NIDS Challenges00:09:00
-
7.4 Snort as NIDS00:08:00
-
7.5 Intrusion Prevention Systems: IPS00:07:00
-
8.1 Wired Equivalent Privacy WEP Attacking00:11:00
-
8.2 WPA and AES Protocols00:09:00
-
8.3 Wireless Security Misconceptions00:09:00
-
8.4 Wireless Attacks and Mitigation00:09:00
-
8.5 Secure Network Design with Wireless00:09:00
-
9.1 Physical Security Objectives00:11:00
-
9.2 Physical Threats and Mitigation00:11:00
-
9.3 Defense in Depth (DiD)00:07:00
-
9.4 Incident00:06:00
-
9.5 Incident Handling00:14:00
-
10.1 Confidentiality, Integrity, and Availability (CIA)00:06:00
-
10.2 Assets, Threats, and Vulnerabilities00:04:00
-
10.3 Risks and Network Intrusion00:06:00
-
10.4 Common Attacks00:09:00
-
10.5 Security Recommendations00:06:00
-
Assignment – Computer Network Security Complete Training
14-Day Money-Back Guarantee
-
Duration:8 hours, 8 minutes
-
Access:1 Year
-
Units:52
Want to get everything for £149
Take Lifetime Pack