Cybersecurity of Networks from Scratch to Advanced
$149.99
Shop on Udemy

Description

By the end of this course you will be fully aware of the wired and wireless computer networks basics, devices, and protocols in a step-by-step pace. You will also reach the professional level in networks security in terms of concepts, technologies, and tools. The course requires no background or pre-requisite, yet you will be able to understand all the up-to-date terminologies in the networks security during the lectures. This course is organized as follows: Section One: Introduction to Computer NetworksLecture 1: What is a Computer Network?Lecture 2: Computer Networks TopologiesLecture 3: Computer Networks CategoriesLecture 4: Computer Networks Devices and ServicesLecture 5: Computer Networks Transmission MediaSection Two: ISO/OSI Model (7 Layers)Lecture 1: Why ISO/OSI Model?Lecture 2: Application, Presentation, and Session LayersLecture 3: Transport and Network LayersLecture 4: Data Link and Physical LayersLecture 5: ISO/OSI Model in ActionSection Three: TCP/IP Protocol SuiteLecture 1: Introduction to Computer Networks ProtocolsLecture 2: IP ProtocolLecture 3: TCP and UDP ProtocolsLecture 4: Application ProtocolsLecture 5: TCP/IP Characteristics and ToolsSection Four: Wireless NetworksLecture 1: Wireless Networks BenefitsLecture 2: Wireless Networks TypesLecture 3: Wireless Networks Protocol (Wi-Fi)Lecture 4: Wireless Networks DevicesLecture 5: Wireless Networks DrawbacksSection Five: Computer Networks SecurityLecture 1: Security GoalsLecture 2: Securing the Network DesignLecture 3: TCP/IP Security and ToolsLecture 4: Port Scanning and ToolsLecture 5: Sniffing and ToolsSection Six: Firewalls and HoneypotsLecture 1: Why Using a Firewall?Lecture 2: Firewalls RulesLecture 3: Firewalls FilteringLecture 4: HoneypotsLecture 5: Bypassing FirewallsSection Seven: Intrusion Detection and Prevention Systems (IDS/IPS)Lecture 1: What is Intrusion Detection Systems (IDS)?Lecture 2: Network IDS (NIDS)Lecture 3: NIDS ChallengesLecture 4: Snort as NIDSLecture 5: Intrusion Prevention Systems (IPS)Section Eight: Wireless Networks SecurityLecture 1: Wired Equivalent Privacy WEP AttackingLecture 2: WPA and AES ProtocolsLecture 3: Wireless Security MisconceptionsLecture 4: Wireless Attacks and MitigationLecture 5: Secure Network Design with WirelessSection Nine: Physical Security & Incident HandlingLecture 1: Physical Security ObjectivesLecture 2: Physical Threats and MitigationLecture 3: Defense in Depth (DiD)Lecture 4: What is an Incident?Lecture 5: Incident HandlingSection Ten: Computer Networks Security ConclusionLecture 1: Confidentiality, Integrity, and Availability (CIA)Lecture 2: Assets, Threats, and VulnerabilitiesLecture 3: Risks and Network IntrusionLecture 4: Common AttacksLecture 5: Security Recommendations

logo

Udemy