Course Curriculum
- 13 sections
- 26 lectures
- 00:00:00 total length
-
Introduction
00:10:00
-
1.1 Computer Network
00:11:00 -
1.2 Computer Network Topologies
00:11:00 -
1.3 Categories of Computer Network
00:10:00 -
1.4 Computer Network Devices
00:11:00 -
1.5 Transmission Media
00:09:00
-
2.1 ISO/OSI Model
00:10:00 -
2.2 Application, Presentation, and Session Layers
00:12:00 -
2.3 Transport and Network Layers
00:11:00 -
2.4 Data Link and Physical Layers
00:09:00 -
2.5 ISO/OSI Model in Action
00:10:00
-
3.1 Introduction to Computer Networks Protocols
00:11:00 -
3.2 IP Protocol
00:13:00 -
3.3 TCP and UDP Protocols
00:12:00 -
3.4 Application Protocols
00:12:00 -
3.5 TCP/IP Characteristics and Tools
00:11:00
-
4.1 Wireless Networks Benefits
00:09:00 -
4.2 Types of Wireless Networks
00:12:00 -
4.3 Wireless Networks Protocol (Wi-Fi)
00:07:00 -
4.4 Wireless Networks Devices
00:10:00 -
4.5 Wireless Networks Drawbacks
00:09:00
-
5.1 Security Goals
00:09:00 -
5.2 Securing the Network Design
00:10:00 -
5.3 TCP/IP Security and Tools
00:12:00 -
5.4 Port Scanning and Tools
00:11:00 -
5.5 Sniffing and Tools
00:10:00
-
6.1 Reasons to Use Firewall
00:13:00 -
6.2 Firewalls Rules
00:11:00 -
6.3 Firewalls Filtering
00:09:00 -
6.4 Honeypots
00:07:00 -
6.5 Bypassing Firewalls
00:08:00
-
7.1 Intrusion Detection System: IDS
00:11:00 -
7.2 Network IDS: NIDS
00:06:00 -
7.3 NIDS Challenges
00:09:00 -
7.4 Snort as NIDS
00:08:00 -
7.5 Intrusion Prevention Systems: IPS
00:07:00
-
8.1 Wired Equivalent Privacy WEP Attacking
00:11:00 -
8.2 WPA and AES Protocols
00:09:00 -
8.3 Wireless Security Misconceptions
00:09:00 -
8.4 Wireless Attacks and Mitigation
00:09:00 -
8.5 Secure Network Design with Wireless
00:09:00
-
9.1 Physical Security Objectives
00:11:00 -
9.2 Physical Threats and Mitigation
00:11:00 -
9.3 Defense in Depth (DiD)
00:07:00 -
9.4 Incident
00:06:00 -
9.5 Incident Handling
00:14:00
-
10.1 Confidentiality, Integrity, and Availability (CIA)
00:06:00 -
10.2 Assets, Threats, and Vulnerabilities
00:04:00 -
10.3 Risks and Network Intrusion
00:06:00 -
10.4 Common Attacks
00:09:00 -
10.5 Security Recommendations
00:06:00
-
Assignment – Computer Networks Security
00:00:00
-
Claim Your Certificate
00:00:00