Skip to content

Computer Networks Security

Computer networks, wireless networks, firewalls and honeypots and much more


Blackboard Learning

Summary

Price
£12 inc VAT
Study method
Online, On Demand What's this?
Duration
1.1 hours · Self-paced
Qualification
No formal qualification
Certificates
  • Certificate of completion - Free
  • Reed Courses Certificate of Completion - Free
Additional info
  • Tutor is available to students

Add to basket or enquire

Overview

This Computer Networks Security course includes a whole host of practical tips and advice, helping you to develop your computer networks security skills to become the cyber security officer or relevant profession you can be.

Packed with videos, PDFs, and exercises, it'll equip you with what it takes to have a successful career as a network administrator in today’s business landscape, covering a broad range of topics, from introduction to computer networks to computer networks security conclusion.

With expert guidance and a combination of videos, PDFs, and worksheets, this course will enable you to develop your firewall filtering skills, become a network administrator, and unlock your full potential.

What will you learn from this course:

  • Computer networks security conclusion: What you need to know
  • Firewalls and honeypots: Tailoring your approach to maximize impact.
  • Mastering computer network security.
  • Firewalls and honeypots.
  • Intrusion detection and prevention systems (IDS/IPS).
  • Wired equivalent privacy WEP attacking.

Curriculum

5
sections
13
lectures
1h 6m
total
    • 1: 5. Installing the Software 01:56
    • 2: 1. Introduction 01:43
    • 3: 2. Who We Are 05:23
    • 4: 4. Download the Required Software and Material 03:41
    • 5: 2. Communication Settings 03:59
    • 6: 1. Interface Explained 05:57
    • 7: 1. First HMI Screen Design 06:40
    • 8: 2. PLC Program to be Controlled by HMI 11:52
    • 9: 1. How to download and Install WPLSoft 05:54
    • 10: 1. Quick Overview 03:10
    • 11: 2. PLC Practical Introduction 06:47
    • 12: 3. HMI Practical 05:35
    • 13: 4. HMI Working 03:17

Course media

Description

Program content:

  • Section One: Introduction to Computer Networks
  • Lecture 1: What is a Computer Network?
  • Lecture 2: Computer Networks Topologies
  • Lecture 3: Computer Networks Categories
  • Lecture 4: Computer Networks Devices and Services
  • Lecture 5: Computer Networks Transmission Media
  • Section Two: ISO/OSI Model (7 Layers)
  • Lecture 1: Why ISO/OSI Model?
  • Lecture 2: Application, Presentation, and Session Layers
  • Lecture 3: Transport and Network Layers
  • Lecture 4: Data Link and Physical Layers
  • Lecture 5: ISO/OSI Model in Action
  • Section Three: TCP/IP Protocol Suite
  • Lecture 1: Introduction to Computer Networks Protocols
  • Lecture 2: IP Protocol
  • Lecture 3: TCP and UDP Protocols
  • Lecture 4: Application Protocols
  • Lecture 5: TCP/IP Characteristics and Tools
  • Section Four: Wireless Networks
  • Lecture 1: Wireless Networks Benefits
  • Lecture 2: Wireless Networks Types
  • Lecture 3: Wireless Networks Protocol (Wi-Fi)
  • Lecture 4: Wireless Networks Devices
  • Lecture 5: Wireless Networks Drawbacks
  • Section Five: Computer Networks Security
  • Lecture 1: Security Goals
  • Lecture 2: Securing the Network Design
  • Lecture 3: TCP/IP Security and Tools
  • Lecture 4: Port Scanning and Tools
  • Lecture 5: Sniffing and Tools
  • Section Six: Firewalls and Honeypots
  • Lecture 1: Why Use a Firewall?
  • Lecture 2: Firewalls Rules
  • Lecture 3: Firewalls Filtering
  • Lecture 4: Honey Pots
  • Lecture 5: Bypassing Firewalls
  • Section Seven: Intrusion Detection and Prevention Systems (IDS/IPS)
  • Lecture 1: What are Intrusion Detection Systems (IDS)?
  • Lecture 2: Network IDS (NIDS)
  • Lecture 3: NIDS Challenges
  • Lecture 4: Snort as NIDS
  • Lecture 5: Intrusion Prevention Systems (IPS)
  • Section Eight: Wireless Networks Security
  • Lecture 1: Wired Equivalent Privacy WEP Attacking
  • Lecture 2: WPA and AES Protocols
  • Lecture 3: Wireless Security Misconceptions
  • Lecture 4: Wireless Attacks and Mitigation
  • Lecture 5: Secure Network Design with Wireless
  • Section Nine: Physical Security & Incident Handling
  • Lecture 1: Physical Security Objectives
  • Lecture 2: Physical Threats and Mitigation
  • Lecture 3: Defence in Depth (DiD)
  • Lecture 4: What is an Incident?
  • Lecture 5: Incident Handling
  • Section Ten: Computer Networks Security Conclusion
  • Lecture 1: Confidentiality, Integrity, and Availability (CIA)
  • Lecture 2: Assets, Threats, and Vulnerabilities
  • Lecture 3: Risks and Network Intrusion
  • Lecture 4: Common Attacks
  • Lecture 5: Security Recommendations

Why Blackboard learning:

Blackboard Learning is an online learning platform by which students from any corner of the world can learn his/her desired course. Using online learning, we assist students in realizing their full potential and advancing their careers. Today, our goal is to be the world's leading provider of online learning experiences with a global impact. By leveraging online learning, we assist students in preparing for bright futures in world-changing jobs. We provide a wide range of categories including Accounting & IT, Programming, Creative, and more. Our courses are designed to stretch students intellectually through state-of-the-art online learning.

Who is this course for?

  • This computer network security is ideal for people looking to progress their career into a cyber security officer.
  • For those who want to become a network administrator, as well as looking to further develop their skills and knowledge.
  • People who want to perform better in computer network security from scratch to advanced related careers.
  • Those who are passionate about computer network security from scratch to advanced related skills.
  • Learners who desire to be more efficient in computer network security from scratch to advanced.

Requirements

No prior knowledge or experience required

Career path

This Computer Networks Security course can help you get the job you're after in the sector.

Questions and answers

Currently there are no Q&As for this course. Be the first to ask a question.

Certificates

Certificate of completion

Digital certificate - Included

Reed Courses Certificate of Completion

Digital certificate - Included

Will be downloadable when all lectures have been completed.

Reviews

Currently there are no reviews for this course. Be the first to leave a review.

FAQs

Study method describes the format in which the course will be delivered. At Reed Courses, courses are delivered in a number of ways, including online courses, where the course content can be accessed online remotely, and classroom courses, where courses are delivered in person at a classroom venue.

CPD stands for Continuing Professional Development. If you work in certain professions or for certain companies, your employer may require you to complete a number of CPD hours or points, per year. You can find a range of CPD courses on Reed Courses, many of which can be completed online.

A regulated qualification is delivered by a learning institution which is regulated by a government body. In England, the government body which regulates courses is Ofqual. Ofqual regulated qualifications sit on the Regulated Qualifications Framework (RQF), which can help students understand how different qualifications in different fields compare to each other. The framework also helps students to understand what qualifications they need to progress towards a higher learning goal, such as a university degree or equivalent higher education award.

An endorsed course is a skills based course which has been checked over and approved by an independent awarding body. Endorsed courses are not regulated so do not result in a qualification - however, the student can usually purchase a certificate showing the awarding body's logo if they wish. Certain awarding bodies - such as Quality Licence Scheme and TQUK - have developed endorsement schemes as a way to help students select the best skills based courses for them.