Tags
Language
Tags
December 2024
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 31 1 2 3 4

Cybersecurity Of Networks From Scratch To Advanced

Posted By: Sigha
Cybersecurity Of Networks From Scratch To Advanced

Cybersecurity Of Networks From Scratch To Advanced
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English (US) | Size: 1.30 GB | Duration: 8h 5m

Computer Networks Security Technologies and Tools for Network Admins and Cyber Security Officers

What you'll learn
Introduction to Computer Networks
ISO/OSI Model (7 Layers)
TCP/IP Protocol Suite
Wireless Networks
Computer Networks Security
Firewalls and Honeypots
Intrusion Detection and Prevention systems (IDS/IPS)
Wireless Networks Security
Physical Security & Incident Handling
Computer Networks Security Recommendations

Requirements
Basic computer knowledge
Basic Internet skills and adequate connection
Beginner networking background
Microsoft Windows machine
Microsoft Power Point for the presentation material
Beginner cyber security information
Laptop machine and standard browser

Description
By the end of this course you will be fully aware of the wired and wireless computer networks basics, devices, and protocols in a step-by-step pace. You will also reach the professional level in networks security in terms of concepts, technologies, and tools. The course requires no background or pre-requisite, yet you will be able to understand all the up-to-date terminologies in the networks security during the lectures.This course is organized as follows:Section One: Introduction to Computer NetworksLecture 1: What is a Computer Network?Lecture 2: Computer Networks TopologiesLecture 3: Computer Networks CategoriesLecture 4: Computer Networks Devices and ServicesLecture 5: Computer Networks Transmission MediaSection Two: ISO/OSI Model (7 Layers)Lecture 1: Why ISO/OSI Model?Lecture 2: Application, Presentation, and Session LayersLecture 3: Transport and Network LayersLecture 4: Data Link and Physical LayersLecture 5: ISO/OSI Model in ActionSection Three: TCP/IP Protocol SuiteLecture 1: Introduction to Computer Networks ProtocolsLecture 2: IP ProtocolLecture 3: TCP and UDP ProtocolsLecture 4: Application ProtocolsLecture 5: TCP/IP Characteristics and ToolsSection Four: Wireless NetworksLecture 1: Wireless Networks BenefitsLecture 2: Wireless Networks TypesLecture 3: Wireless Networks Protocol (Wi-Fi)Lecture 4: Wireless Networks DevicesLecture 5: Wireless Networks DrawbacksSection Five: Computer Networks SecurityLecture 1: Security GoalsLecture 2: Securing the Network DesignLecture 3: TCP/IP Security and ToolsLecture 4: Port Scanning and ToolsLecture 5: Sniffing and ToolsSection Six: Firewalls and HoneypotsLecture 1: Why Using a Firewall?Lecture 2: Firewalls RulesLecture 3: Firewalls FilteringLecture 4: HoneypotsLecture 5: Bypassing FirewallsSection Seven: Intrusion Detection and Prevention Systems (IDS/IPS)Lecture 1: What is Intrusion Detection Systems (IDS)?Lecture 2: Network IDS (NIDS)Lecture 3: NIDS ChallengesLecture 4: Snort as NIDSLecture 5: Intrusion Prevention Systems (IPS)Section Eight: Wireless Networks SecurityLecture 1: Wired Equivalent Privacy WEP AttackingLecture 2: WPA and AES ProtocolsLecture 3: Wireless Security MisconceptionsLecture 4: Wireless Attacks and MitigationLecture 5: Secure Network Design with WirelessSection Nine: Physical Security & Incident HandlingLecture 1: Physical Security ObjectivesLecture 2: Physical Threats and MitigationLecture 3: Defense in Depth (DiD)Lecture 4: What is an Incident?Lecture 5: Incident HandlingSection Ten: Computer Networks Security ConclusionLecture 1: Confidentiality, Integrity, and Availability (CIA)Lecture 2: Assets, Threats, and VulnerabilitiesLecture 3: Risks and Network IntrusionLecture 4: Common AttacksLecture 5: Security Recommendations

Who this course is for:
Network administrators,Cyber security officers,Computer science undergraduates,Computer engineering undergraduates,Network security postgraduates,Network technical support specialists,Security incident handlers,IT Engineers and CEOs,Software Developers,Web Developers,Mobile Applications Developers


Cybersecurity Of Networks From Scratch To Advanced


For More Courses Visit & Bookmark Your Preferred Language Blog
From Here: English - Français - Italiano - Deutsch - Español - Português - Polski - Türkçe - Русский