Course Curriculum
- 13 sections
- 53 lectures
- 8 hours, 8 minutes total length
-
Introduction00:10:00
-
1.1 Computer Network00:11:00
-
1.2 Computer Network Topologies00:11:00
-
1.3 Categories of Computer Network00:10:00
-
1.4 Computer Network Devices00:11:00
-
1.5 Transmission Media00:09:00
-
2.1 ISO/OSI Model00:10:00
-
2.2 Application, Presentation, and Session Layers00:12:00
-
2.3 Transport and Network Layers00:11:00
-
2.4 Data Link and Physical Layers00:09:00
-
2.5 ISO/OSI Model in Action00:10:00
-
3.1 Introduction to Computer Networks Protocols00:11:00
-
3.2 IP Protocol00:13:00
-
3.3 TCP and UDP Protocols00:12:00
-
3.4 Application Protocols00:12:00
-
3.5 TCP/IP Characteristics and Tools00:11:00
-
4.1 Wireless Networks Benefits00:09:00
-
4.2 Types of Wireless Networks00:12:00
-
4.3 Wireless Networks Protocol (Wi-Fi)00:07:00
-
4.4 Wireless Networks Devices00:10:00
-
4.5 Wireless Networks Drawbacks00:09:00
-
5.1 Security Goals00:09:00
-
5.2 Securing the Network Design00:10:00
-
5.3 TCP/IP Security and Tools00:12:00
-
5.4 Port Scanning and Tools00:11:00
-
5.5 Sniffing and Tools00:10:00
-
6.1 Reasons to Use Firewall00:13:00
-
6.2 Firewalls Rules00:11:00
-
6.3 Firewalls Filtering00:09:00
-
6.4 Honeypots00:07:00
-
6.5 Bypassing Firewalls00:08:00
-
7.1 Intrusion Detection System: IDS00:11:00
-
7.2 Network IDS: NIDS00:06:00
-
7.3 NIDS Challenges00:09:00
-
7.4 Snort as NIDS00:08:00
-
7.5 Intrusion Prevention Systems: IPS00:07:00
-
8.1 Wired Equivalent Privacy WEP Attacking00:11:00
-
8.2 WPA and AES Protocols00:09:00
-
8.3 Wireless Security Misconceptions00:09:00
-
8.4 Wireless Attacks and Mitigation00:09:00
-
8.5 Secure Network Design with Wireless00:09:00
-
9.1 Physical Security Objectives00:11:00
-
9.2 Physical Threats and Mitigation00:11:00
-
9.3 Defense in Depth (DiD)00:07:00
-
9.4 Incident00:06:00
-
9.5 Incident Handling00:14:00
-
10.1 Confidentiality, Integrity, and Availability (CIA)00:06:00
-
10.2 Assets, Threats, and Vulnerabilities00:04:00
-
10.3 Risks and Network Intrusion00:06:00
-
10.4 Common Attacks00:09:00
-
10.5 Security Recommendations00:06:00
-
Assignment – Computer Networks Security
-
Claim Your Certificate