Computer Networks Security from Scratch to Advanced
Free eCertificate | Limited time | Networks Security Masterclass | Tutor Support | Video Lessons
Frontier Education
Summary
- Reed courses certificate of completion - Free
- Tutor is available to students
Add to basket or enquire
Overview
By the end of this course you will be fully aware of the wired and wireless computer networks basics, devices, and protocols in a step-by-step pace. The course requires no background or pre-requisite, yet you will be able to understand all the up-to-date terminologies in network security during the lectures.
Certificates
Reed courses certificate of completion
Digital certificate - Included
Will be downloadable when all lectures have been completed
Curriculum
Course media
Description
In this Computer Networks Security course you will explore the TCP/IP Protocol Suite,Intrusion Detection and Prevention systems (IDS/IPS),Physical Security & Incident Handling,ISO/OSI Model (7 Layers),Wireless Networks,Firewalls and Honeypots and others. You will learn how to meet Computer Networks Security challenges through efficient use of practices and technology.
You will also reach the professional level in network security in terms of concepts, technologies, and tools.
Students will have the opportunity to develop knowledge, skills and insight in the following curriculum:
Section One: introduction to Computer Networks
- Lecture 1: What is a Computer Network?
- Lecture 2: Computer Networks Topologies
- Lecture 3: Computer Networks Categories
- Lecture 4: Computer Networks Devices and Services
- Lecture 5: Computer Networks Transmission Media
Section Two: ISO/OSI Model (7 Layers)
- Lecture 1: Why ISO/OSI Model?
- Lecture 2: Application, Presentation, and Session Layers
- Lecture 3: Transport and Network Layers
- Lecture 4: Data Link and Physical Layers
- Lecture 5: ISO/OSI Model in Action
Section Three: TCP/IP Protocol Suite
- Lecture 1: Introduction to Computer Networks Protocols
- Lecture 2: IP Protocol
- Lecture 3: TCP and UDP Protocols
- Lecture 4: Application Protocols
- Lecture 5: TCP/IP Characteristics and Tools
Section Four: Wireless Networks
- Lecture 1: Wireless Networks Benefits
- Lecture 2: Wireless Networks Types
- Lecture 3: Wireless Networks Protocol (Wi-Fi)
- Lecture 4: Wireless Networks Devices
- Lecture 5: Wireless Networks Drawbacks
Section Five: Computer Networks Security
- Lecture 1: Security Goals
- Lecture 2: Securing the Network Design
- Lecture 3: TCP/IP Security and Tools
- Lecture 4: Port Scanning and Tools
- Lecture 5: Sniffing and Tools
Section Six: Firewalls and Honeypots
- Lecture 1: Why Using a Firewall?
- Lecture 2: Firewalls Rules
- Lecture 3: Firewalls Filtering
- Lecture 4: Honey Pots
- Lecture 5: Bypassing Firewalls
Section Seven: Intrusion Detection and Prevention systems (IDS/IPS)
- Lecture 1: What is Intrusion Detection Systems (IDS)?
- Lecture 2: Network IDS (NIDS)
- Lecture 3: NIDS Challenges
- Lecture 4: Snort as NIDS
- Lecture 5: Intrusion Prevention Systems (IPS)
Section Eight: Wireless Networks Security
- Lecture 1: Wired Equivalent Privacy WEP Attacking
- Lecture 2: WPA and AES Protocols
- Lecture 3: Wireless Security Misconceptions
- Lecture 4: Wireless Attacks and Mitigation
- Lecture 5: Secure Network Design with Wireless
Section Nine: Physical Security & Incident Handling
- Lecture 1: Physical Security Objectives
- Lecture 2: Physical Threats and Mitigation
- Lecture 3: Defense in Depth (DiD)
- Lecture 4: What is an Incident?
- Lecture 5: Incident Handling
Section Ten: Computer Networks Security Conclusion
- Lecture 1: Confidentiality, Integrity, and Availability (CIA)
- Lecture 2: Assets, Threats, and Vulnerabilities
- Lecture 3: Risks and Network Intrusion
- Lecture 4: Common Attacks
- Lecture 5: Security Recommendations
Top reasons to Study Online at Frontier Education
- Tailor made: Course adapted to market needs and interests
- Flexible programs: study and work at your own pace on easy-to-use web platforms
- Online education: progressive teaching methods with video or easy to understand medium
- Multicultural: connect with classmates from all corners of the globe
Who is this course for?
- Anyone interested in computer Network security
- Network administrators
- Cyber security officers
- Computer science undergraduates
- Computer engineering undergraduates
- Network security postgraduates
- Network technical support specialists
- Security incident handlers
- IT Engineers and CEOs
- Software Developers
Requirements
No prior knowledge or experience required
Questions and answers
Currently there are no Q&As for this course. Be the first to ask a question.
Reviews
Legal information
This course is advertised on reed.co.uk by the Course Provider, whose terms and conditions apply. Purchases are made directly from the Course Provider, and as such, content and materials are supplied by the Course Provider directly. Reed is acting as agent and not reseller in relation to this course. Reed's only responsibility is to facilitate your payment for the course. It is your responsibility to review and agree to the Course Provider's terms and conditions and satisfy yourself as to the suitability of the course you intend to purchase. Reed will not have any responsibility for the content of the course and/or associated materials.