4.31 out of 5
4.31
1631 reviews on Udemy

Computer Networks Security from Scratch to Advanced

Computer Networks Security Technologies and Tools for Network Admins and Cyber Security Officers
Instructor:
Mohammad Adly
77,364 students enrolled
English [Auto]
Introduction to Computer Networks
ISO/OSI Model (7 Layers)
TCP/IP Protocol Suite
Wireless Networks
Computer Networks Security
Firewalls and Honeypots
Intrusion Detection and Prevention systems (IDS/IPS)
Wireless Networks Security
Physical Security & Incident Handling
Computer Networks Security Recommendations

By the end of this course you will be fully aware of the wired and wireless computer networks basics, devices, and protocols in a step-by-step pace. You will also reach the professional level in networks security in terms of concepts, technologies, and tools. The course requires no background or pre-requisite, yet you will be able to understand all the up-to-date terminologies in the networks security during the lectures.

This course is organized as follows:

Section One: introduction to Computer Networks

  • Lecture 1: What is a Computer Network?
  • Lecture 2: Computer Networks Topologies
  • Lecture 3: Computer Networks Categories
  • Lecture 4: Computer Networks Devices and Services
  • Lecture 5: Computer Networks Transmission Media

Section Two: ISO/OSI Model (7 Layers)

  • Lecture 1: Why ISO/OSI Model?
  • Lecture 2: Application, Presentation, and Session Layers
  • Lecture 3: Transport and Network Layers
  • Lecture 4: Data Link and Physical Layers
  • Lecture 5: ISO/OSI Model in Action

Section Three: TCP/IP Protocol Suite

  • Lecture 1: Introduction to Computer Networks Protocols
  • Lecture 2: IP Protocol
  • Lecture 3: TCP and UDP Protocols
  • Lecture 4: Application Protocols
  • Lecture 5: TCP/IP Characteristics and Tools

Section Four: Wireless Networks

  • Lecture 1: Wireless Networks Benefits
  • Lecture 2: Wireless Networks Types
  • Lecture 3: Wireless Networks Protocol (Wi-Fi)
  • Lecture 4: Wireless Networks Devices
  • Lecture 5: Wireless Networks Drawbacks

Section Five: Computer Networks Security

  • Lecture 1: Security Goals
  • Lecture 2: Securing the Network Design
  • Lecture 3: TCP/IP Security and Tools
  • Lecture 4: Port Scanning and Tools
  • Lecture 5: Sniffing and Tools

Section Six: Firewalls and Honeypots

  • Lecture 1: Why Using a Firewall?
  • Lecture 2: Firewalls Rules
  • Lecture 3: Firewalls Filtering
  • Lecture 4: Honey Pots
  • Lecture 5: Bypassing Firewalls

Section Seven: Intrusion Detection and Prevention systems (IDS/IPS)

  • Lecture 1: What is Intrusion Detection Systems (IDS)?
  • Lecture 2: Network IDS (NIDS)
  • Lecture 3: NIDS Challenges
  • Lecture 4: Snort as NIDS
  • Lecture 5: Intrusion Prevention Systems (IPS)

Section Eight: Wireless Networks Security

  • Lecture 1: Wired Equivalent Privacy WEP Attacking
  • Lecture 2: WPA and AES Protocols
  • Lecture 3: Wireless Security Misconceptions
  • Lecture 4: Wireless Attacks and Mitigation
  • Lecture 5: Secure Network Design with Wireless

Section Nine: Physical Security & Incident Handling

  • Lecture 1: Physical Security Objectives
  • Lecture 2: Physical Threats and Mitigation
  • Lecture 3: Defense in Depth (DiD)
  • Lecture 4: What is an Incident?
  • Lecture 5: Incident Handling

Section Ten: Computer Networks Security Conclusion

  • Lecture 1: Confidentiality, Integrity, and Availability (CIA)
  • Lecture 2: Assets, Threats, and Vulnerabilities
  • Lecture 3: Risks and Network Intrusion
  • Lecture 4: Common Attacks
  • Lecture 5: Security Recommendations

Introduction to Computer Networks

1
Introduction
2
What is a Computer Network?
3
Computer Networks Topologies
4
Computer Networks Categories
5
Computer Networks Devices and Services
6
Computer Networks Transmission Media
7
Quiz on Section One

Tests your information about Section One

ISO/OSI Model (7 Layers)

1
Why ISO/OSI Model?
2
Application, Presentation, and Session Layers
3
Transport and Network Layers
4
Data Link and Physical Layers
5
ISO/OSI Model in Action
6
Quiz on Section Two

Test your information about Section Two

TCP/IP Protocol Suite

1
Introduction to Computer Networks Protocols
2
IP Protocol
3
TCP and UDP Protocols
4
Application Protocols
5
TCP/IP Characteristics and Tools
6
Quiz on Section Three

Test your information about Section Three

Wireless Networks

1
Wireless Networks Benefits
2
Wireless Networks Types
3
Wireless Networks Protocol (Wi-Fi)
4
Wireless Networks Devices
5
Wireless Networks Drawbacks
6
Quiz on Section Four

Test your information about Section Four

Computer Networks Security

1
Security Goals
2
Securing the Network Design
3
TCP/IP Security and Tools
4
Port Scanning and Tools
5
Sniffing and Tools
6
Quiz on Section Five

Test your information about Section Five

Firewalls and Honeypots

1
Why Using a Firewall?
2
Firewalls Rules
3
Firewalls Filtering
4
Honeypots
5
Bypassing Firewalls
6
Quiz on Section Six

Test your information about Section Six

Intrusion Detection and Prevention Systems (IDS/IPS)

1
What is Intrusion Detection Systems (IDS)?
2
Network IDS (NIDS)
3
NIDS Challenges
4
Snort as NIDS
5
Intrusion Prevention Systems (IPS)
6
Quiz on Section Seven

Test your information about Section Seven

Wireless Networks Security

1
Wired Equivalent Privacy WEP Attacking
2
WPA and AES Protocols
3
Wireless Security Misconceptions
4
Wireless Attacks and Mitigation
5
Secure Network Design with Wireless
6
Quiz on Section Eight

Test your information on Section Eight

Physical Security and Incident Handling

1
Physical Security Objectives
2
Physical Threats and Mitigation
3
Defense in Depth (DiD)
4
What is an Incident?
5
Incident Handling
6
Quiz on Section Nine

Test your information on Section Nine

Computer Networks Security Conclusion

1
Confidentiality, Integrity, and Availability (CIA)
2
Assets, Threats, and Vulnerabilities
3
Risks and Network Intrusion
4
Common Attacks
5
Security Recommendations
6
Quiz on Section Ten

Test your information about Section Ten

7
Final Exam

This exam tests your overall comprehension of this course, and stresses on the data you need to come out with from it.

You can view and review the lecture materials indefinitely, like an on-demand channel.
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don't have an internet connection, some instructors also let their students download course lectures. That's up to the instructor though, so make sure you get on their good side!
4.3
4.3 out of 5
1631 Ratings

Detailed Rating

Stars 5
755
Stars 4
550
Stars 3
247
Stars 2
47
Stars 1
32
b03adc48d5f36b2dcdb9ffa40f05469b
30-Day Money-Back Guarantee

Includes

8 hours on-demand video
Full lifetime access
Access on mobile and TV
Certificate of Completion

External Links May Contain Affiliate Links read more

Join our Telegram Channel To Get Latest Notification & Course Updates!
Join Our Telegram For FREE Courses & Canva PremiumJOIN NOW