Skip to content

Computer Networks Security from Scratch to Advanced

Free eCertificate | Limited time | Networks Security Masterclass | Tutor Support | Video Lessons


Frontier Education

Summary

Price
£12 inc VAT
Study method
Online, On Demand What's this?
Duration
8.1 hours · Self-paced
Qualification
No formal qualification
Certificates
  • Reed courses certificate of completion - Free
Additional info
  • Tutor is available to students

85 students purchased this course

Add to basket or enquire

Overview

By the end of this course you will be fully aware of the wired and wireless computer networks basics, devices, and protocols in a step-by-step pace. The course requires no background or pre-requisite, yet you will be able to understand all the up-to-date terminologies in network security during the lectures.

Curriculum

11
sections
51
lectures
8h 6m
total
    • 1: Intro 09:57
    • 2: Sec1 Lec1 10:30
    • 3: Sec1 Lec2 11:06
    • 4: Sec1 Lec3 09:47
    • 5: Sec1 Lec4 10:39
    • 6: Sec1 Lec5 09:20
    • 7: Sec2 Lec1 09:57
    • 8: Sec2 Lec2 11:50
    • 9: Sec2 Lec3 10:47
    • 10: Sec2 Lec4 08:33
    • 11: Sec2 Lec5 10:04
    • 12: Sec3 Lec1 10:41
    • 13: Sec3 Lec2 12:53
    • 14: Sec3 Lec3 12:28
    • 15: Sec3 Lec4 11:37
    • 16: Sec3 Lec5 10:39
    • 17: Sec4 Lec1 09:19
    • 18: Sec4 Lec2 12:15
    • 19: Sec4 Lec3 06:47
    • 20: Sec4 Lec4 10:28
    • 21: Sec4 Lec5 09:24
    • 22: Sec5 Lec1 08:53
    • 23: Sec5 Lec2 10:07
    • 24: Sec5 Lec3 11:50
    • 25: Sec5 Lec4 11:15
    • 26: Sec5 Lec5 10:18
    • 27: Sec6 Lec1 12:49
    • 28: Sec6 Lec2 10:32
    • 29: Sec6 Lec3 08:34
    • 30: Sec6 Lec4 06:42
    • 31: Sec6 Lec5 08:01
    • 32: Sec7 Lec1 11:17
    • 33: Sec7 Lec2 06:09
    • 34: Sec7 Lec3 08:56
    • 35: Sec7 Lec4 08:20
    • 36: Sec7 Lec5 07:22
    • 37: Sec8 Lec1 10:41
    • 38: Sec8 Lec2 08:31
    • 39: Sec8 Lec3 08:39
    • 40: Sec8 Lec4 09:09
    • 41: Sec8 Lec5 08:42
    • 42: Sec9 Lec1 10:46
    • 43: Sec9 Lec2 10:50
    • 44: Sec9 Lec3 07:18
    • 45: Sec9 Lec4 05:41
    • 46: Sec9 Lec5 13:50
    • 47: Sec10 Lec1 06:10
    • 48: Sec10 Lec2 04:10
    • 49: Sec10 Lec3 05:37
    • 50: Sec10 Lec4 08:47
    • 51: Sec10 Lec5 06:18

Course media

Description

In this Computer Networks Security course you will explore the TCP/IP Protocol Suite,Intrusion Detection and Prevention systems (IDS/IPS),Physical Security & Incident Handling,ISO/OSI Model (7 Layers),Wireless Networks,Firewalls and Honeypots and others. You will learn how to meet Computer Networks Security challenges through efficient use of practices and technology.

You will also reach the professional level in network security in terms of concepts, technologies, and tools.

Students will have the opportunity to develop knowledge, skills and insight in the following curriculum:

Section One: introduction to Computer Networks

  • Lecture 1: What is a Computer Network?
  • Lecture 2: Computer Networks Topologies
  • Lecture 3: Computer Networks Categories
  • Lecture 4: Computer Networks Devices and Services
  • Lecture 5: Computer Networks Transmission Media

Section Two: ISO/OSI Model (7 Layers)

  • Lecture 1: Why ISO/OSI Model?
  • Lecture 2: Application, Presentation, and Session Layers
  • Lecture 3: Transport and Network Layers
  • Lecture 4: Data Link and Physical Layers
  • Lecture 5: ISO/OSI Model in Action

Section Three: TCP/IP Protocol Suite

  • Lecture 1: Introduction to Computer Networks Protocols
  • Lecture 2: IP Protocol
  • Lecture 3: TCP and UDP Protocols
  • Lecture 4: Application Protocols
  • Lecture 5: TCP/IP Characteristics and Tools

Section Four: Wireless Networks

  • Lecture 1: Wireless Networks Benefits
  • Lecture 2: Wireless Networks Types
  • Lecture 3: Wireless Networks Protocol (Wi-Fi)
  • Lecture 4: Wireless Networks Devices
  • Lecture 5: Wireless Networks Drawbacks

Section Five: Computer Networks Security

  • Lecture 1: Security Goals
  • Lecture 2: Securing the Network Design
  • Lecture 3: TCP/IP Security and Tools
  • Lecture 4: Port Scanning and Tools
  • Lecture 5: Sniffing and Tools

Section Six: Firewalls and Honeypots

  • Lecture 1: Why Using a Firewall?
  • Lecture 2: Firewalls Rules
  • Lecture 3: Firewalls Filtering
  • Lecture 4: Honey Pots
  • Lecture 5: Bypassing Firewalls

Section Seven: Intrusion Detection and Prevention systems (IDS/IPS)

  • Lecture 1: What is Intrusion Detection Systems (IDS)?
  • Lecture 2: Network IDS (NIDS)
  • Lecture 3: NIDS Challenges
  • Lecture 4: Snort as NIDS
  • Lecture 5: Intrusion Prevention Systems (IPS)

Section Eight: Wireless Networks Security

  • Lecture 1: Wired Equivalent Privacy WEP Attacking
  • Lecture 2: WPA and AES Protocols
  • Lecture 3: Wireless Security Misconceptions
  • Lecture 4: Wireless Attacks and Mitigation
  • Lecture 5: Secure Network Design with Wireless

Section Nine: Physical Security & Incident Handling

  • Lecture 1: Physical Security Objectives
  • Lecture 2: Physical Threats and Mitigation
  • Lecture 3: Defense in Depth (DiD)
  • Lecture 4: What is an Incident?
  • Lecture 5: Incident Handling

Section Ten: Computer Networks Security Conclusion

  • Lecture 1: Confidentiality, Integrity, and Availability (CIA)
  • Lecture 2: Assets, Threats, and Vulnerabilities
  • Lecture 3: Risks and Network Intrusion
  • Lecture 4: Common Attacks
  • Lecture 5: Security Recommendations

Top reasons to Study Online at Frontier Education

  • Tailor made: Course adapted to market needs and interests
  • Flexible programs: study and work at your own pace on easy-to-use web platforms
  • Online education: progressive teaching methods with video or easy to understand medium
  • Multicultural: connect with classmates from all corners of the globe

Who is this course for?

  • Anyone interested in computer Network security
  • Network administrators
  • Cyber security officers
  • Computer science undergraduates
  • Computer engineering undergraduates
  • Network security postgraduates
  • Network technical support specialists
  • Security incident handlers
  • IT Engineers and CEOs
  • Software Developers

Requirements

No prior knowledge or experience required

Questions and answers

Currently there are no Q&As for this course. Be the first to ask a question.

Certificates

Reed courses certificate of completion

Digital certificate - Included

Will be downloadable when all lectures have been completed

Reviews

5.0
Course rating
100%
Service
100%
Content
100%
Value

FAQs

Study method describes the format in which the course will be delivered. At Reed Courses, courses are delivered in a number of ways, including online courses, where the course content can be accessed online remotely, and classroom courses, where courses are delivered in person at a classroom venue.

CPD stands for Continuing Professional Development. If you work in certain professions or for certain companies, your employer may require you to complete a number of CPD hours or points, per year. You can find a range of CPD courses on Reed Courses, many of which can be completed online.

A regulated qualification is delivered by a learning institution which is regulated by a government body. In England, the government body which regulates courses is Ofqual. Ofqual regulated qualifications sit on the Regulated Qualifications Framework (RQF), which can help students understand how different qualifications in different fields compare to each other. The framework also helps students to understand what qualifications they need to progress towards a higher learning goal, such as a university degree or equivalent higher education award.

An endorsed course is a skills based course which has been checked over and approved by an independent awarding body. Endorsed courses are not regulated so do not result in a qualification - however, the student can usually purchase a certificate showing the awarding body's logo if they wish. Certain awarding bodies - such as Quality Licence Scheme and TQUK - have developed endorsement schemes as a way to help students select the best skills based courses for them.