Computer Networks Security from Scratch to Advanced
4.4 (181 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
5,362 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Computer Networks Security from Scratch to Advanced to your Wishlist.

Add to Wishlist

Computer Networks Security from Scratch to Advanced

Computer Networks Security Technologies and Tools for Network Admins and Security Officers
4.4 (181 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
5,362 students enrolled
Created by Mohammad Adly
Last updated 6/2017
English
Current price: $10 Original price: $150 Discount: 93% off
5 hours left at this price!
30-Day Money-Back Guarantee
Includes:
  • 8 hours on-demand video
  • 51 Supplemental Resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • introduction to Computer Networks
  • ISO/OSI Model (7 Layers)
  • TCP/IP Protocol Suite
  • Wireless Networks
  • Computer Networks Security
  • Firewalls and Honeypots
  • Intrusion Detection and Prevention systems (IDS/IPS)
  • Wireless Networks Security
  • Physical Security & Incident Handling
  • Computer Networks Security Recommendations
View Curriculum
Requirements
  • Basic computer knowledge
  • Basic Internet skills and adequate connection
  • Beginner networking background
  • Microsoft Windows machine
  • Microsoft Power Point for the presentation material
  • Beginner cyber security information
  • Laptop machine and standard browser
Description

By the end of this course you will be fully aware of the wired and wireless computer networks basics, devices, and protocols in a step-by-step pace. You will also reach the professional level in networks security in terms of concepts, technologies, and tools. The course requires no background or pre-requisite, yet you will be able to understand all the up-to-date terminologies in the networks security during the lectures.

This course is organized as follows:

Section One: introduction to Computer Networks

  • Lecture 1: What is a Computer Network?
  • Lecture 2: Computer Networks Topologies
  • Lecture 3: Computer Networks Categories
  • Lecture 4: Computer Networks Devices and Services
  • Lecture 5: Computer Networks Transmission Media

Section Two: ISO/OSI Model (7 Layers)

  • Lecture 1: Why ISO/OSI Model?
  • Lecture 2: Application, Presentation, and Session Layers
  • Lecture 3: Transport and Network Layers
  • Lecture 4: Data Link and Physical Layers
  • Lecture 5: ISO/OSI Model in Action

Section Three: TCP/IP Protocol Suite

  • Lecture 1: Introduction to Computer Networks Protocols
  • Lecture 2: IP Protocol
  • Lecture 3: TCP and UDP Protocols
  • Lecture 4: Application Protocols
  • Lecture 5: TCP/IP Characteristics and Tools

Section Four: Wireless Networks

  • Lecture 1: Wireless Networks Benefits
  • Lecture 2: Wireless Networks Types
  • Lecture 3: Wireless Networks Protocol (Wi-Fi)
  • Lecture 4: Wireless Networks Devices
  • Lecture 5: Wireless Networks Drawbacks

Section Five: Computer Networks Security

  • Lecture 1: Security Goals
  • Lecture 2: Securing the Network Design
  • Lecture 3: TCP/IP Security and Tools
  • Lecture 4: Port Scanning and Tools
  • Lecture 5: Sniffing and Tools

Section Six: Firewalls and Honeypots

  • Lecture 1: Why Using a Firewall?
  • Lecture 2: Firewalls Rules
  • Lecture 3: Firewalls Filtering
  • Lecture 4: Honey Pots
  • Lecture 5: Bypassing Firewalls

Section Seven: Intrusion Detection and Prevention systems (IDS/IPS)

  • Lecture 1: What is Intrusion Detection Systems (IDS)?
  • Lecture 2: Network IDS (NIDS)
  • Lecture 3: NIDS Challenges
  • Lecture 4: Snort as NIDS
  • Lecture 5: Intrusion Prevention Systems (IPS)

Section Eight: Wireless Networks Security

  • Lecture 1: Wired Equivalent Privacy WEP Attacking
  • Lecture 2: WPA and AES Protocols
  • Lecture 3: Wireless Security Misconceptions
  • Lecture 4: Wireless Attacks and Mitigation
  • Lecture 5: Secure Network Design with Wireless

Section Nine: Physical Security & Incident Handling

  • Lecture 1: Physical Security Objectives
  • Lecture 2: Physical Threats and Mitigation
  • Lecture 3: Defense in Depth (DiD)
  • Lecture 4: What is an Incident?
  • Lecture 5: Incident Handling

Section Ten: Computer Networks Security Conclusion

  • Lecture 1: Confidentiality, Integrity, and Availability (CIA)
  • Lecture 2: Assets, Threats, and Vulnerabilities
  • Lecture 3: Risks and Network Intrusion
  • Lecture 4: Common Attacks
  • Lecture 5: Security Recommendations
Who is the target audience?
  • Network administrators
  • Cyber security officers
  • Computer science undergraduates
  • Computer engineering undergraduates
  • Network security postgraduates
  • Network technical support specialists
  • Security incident handlers
  • IT Engineers and CEOs
  • Software Developers
  • Web Developers
  • Mobile Applications Developers
Students Who Viewed This Course Also Viewed
Curriculum For This Course
51 Lectures
08:04:52
+
Introduction to Computer Networks
6 Lectures 01:01:16


Computer Networks Topologies
11:06

Computer Networks Categories
09:47

Computer Networks Devices and Services
10:38

Computer Networks Transmission Media
09:19

Tests your information about Section One

Quiz on Section One
5 questions
+
ISO/OSI Model (7 Layers)
5 Lectures 51:08
Why ISO/OSI Model?
09:56

Application, Presentation, and Session Layers
11:50

Transport and Network Layers
10:46

Data Link and Physical Layers
08:32

ISO/OSI Model in Action
10:04

Test your information about Section Two

Quiz on Section Two
5 questions
+
TCP/IP Protocol Suite
5 Lectures 58:17
Introduction to Computer Networks Protocols
10:41

IP Protocol
12:53

TCP and UDP Protocols
12:28

Application Protocols
11:36

TCP/IP Characteristics and Tools
10:39

Test your information about Section Three

Quiz on Section Three
5 questions
+
Wireless Networks
5 Lectures 48:11
Wireless Networks Benefits
09:19

Wireless Networks Types
12:14

Wireless Networks Protocol (Wi-Fi)
06:47

Wireless Networks Devices
10:28

Wireless Networks Drawbacks
09:23

Test your information about Section Four

Quiz on Section Four
5 questions
+
Computer Networks Security
5 Lectures 52:23
Security Goals
08:53

Securing the Network Design
10:07

TCP/IP Security and Tools
11:50

Port Scanning and Tools
11:15

Sniffing and Tools
10:18

Test your information about Section Five

Quiz on Section Five
5 questions
+
Firewalls and Honeypots
5 Lectures 46:35
Why Using a Firewall?
12:49

Firewalls Rules
10:31

Firewalls Filtering
08:33

Honeypots
06:42

Bypassing Firewalls
08:00

Test your information about Section Six

Quiz on Section Six
5 questions
+
Intrusion Detection and Prevention systems (IDS/IPS)
5 Lectures 42:00
What is Intrusion Detection Systems (IDS)?
11:16

Network IDS (NIDS)
06:08

NIDS Challenges
08:55

Snort as NIDS
08:20

Intrusion Prevention Systems (IPS)
07:21

Test your information about Section Seven

Quiz on Section Seven
5 questions
+
Wireless Networks Security
5 Lectures 45:39
Wired Equivalent Privacy WEP Attacking
10:40

WPA and AES Protocols
08:31

Wireless Security Misconceptions
08:39

Wireless Attacks and Mitigation
09:08

Secure Network Design with Wireless
08:41

Test your information on Section Eight

Quiz on Section Eight
5 questions
+
Physical Security and Incident Handling
5 Lectures 48:23
Physical Security Objectives
10:45

Physical Threats and Mitigation
10:50

Defense in Depth (DiD)
07:18

What is an Incident?
05:40

Incident Handling
13:50

Test your information on Section Nine

Quiz on Section Nine
5 questions
+
Computer Networks Security Conclusion
5 Lectures 31:00
Confidentiality, Integrity, and Availability (CIA)
06:10

Assets, Threats, and Vulnerabilities
04:10

Risks and Network Intrusion
05:36

Common Attacks
08:46

Security Recommendations
06:18

Test your information about Section Ten

Quiz on Section Ten
5 questions
About the Instructor
Mohammad Adly
4.4 Average rating
177 Reviews
5,362 Students
1 Course
Ph. D. Computer Networks
  • Ph. D., “Enhanced Congestion Control for Internet Media Traffic”, Computer Engineering and Sciences Dept., Faculty of Electronic Engineering, Menofiya University, 2006 - 2013.
  • M. Sc., “Video Services for Distant Work in an IP Environment”, Computer Engineering and Sciences Dept., Faculty of Electronic Engineering, Menoufiya University, 2002 - 2005.
  • Researcher, IRISA Institute, Rennes I University, France, 2001 - 2002.
  • Information Technology Diploma, Information Technology Institute ITI, Computer Networks Dept., 1998 - 1999.
  • B. Sc., Communications and Electronics Dept., Faculty of Engineering, Cairo University, 1993 - 1998.
  • Lean Six Sigma Green Belt, SECC/ITIDA, April 2016.
  • Dale Carnegie Certified Instructor, 2015
  • GIAC Assessing Wireless Networks GAWN 617, SysAdmin, Audit, Network, Security SANS, 2010.
  • GIAC Certified Firewall Analyst GCFW 502, SysAdmin, Audit, Network, Security SANS, 2009.
  • GIAC Certified Incident Handler GCIH 504, SysAdmin, Audit, Network, Security SANS, 2009.
  • GIAC Security Essentials GSEC 401, SysAdmin, Audit, Network, Security SANS, 2009.
  • RITI Advanced Management Program RAMP, Regional Information Technology Institute RITI, 2008.
  • “Enhanced TCP-Friendly Rate Control for Supporting Video Traffic over Internet”, Mohammad A. Talaat, Gamal M. Attiya, and Magdi A. Koutb, Canadian Journal of Electrical and Computer Engineering CJECE, vol. 36, no. 4, 2013.
  • “ETFRC: Enhanced TFRC for Media Traffic over Internet”, International Journal of Computer Networks, IJCN, vol. 3, no. 3, pp. 167-177, August 2011.
  • “ETFRC: Enhanced TFRC for Media Traffic”, International Journal of Computer Applications, IJCA, vol. 18, no. 6, pp. 1-8, March 2011.
  • “PSNR Evaluation for Media Traffic over TFRC”, Mohammad A. Talaat, Magdi A. Koutb, and Hoda S. Sorour, International Journal of Computer Networks & CommunicationsIJCNC, vol. 1, no. 3, pp. 71-76, October 2009.
  • “A Survey on Unicast Congestion Control Protocols for Media Traffic”, Mohammad A. Talaat, Magdi A. Koutb, and Hoda S. Sorour, International Journal of Computer Science and Network Security IJCSNS, vol. 9, no. 3, pp. 254-261, March 2009.
  • “Congestion Control for Internet Media Traffic”, Mohammad A. Talaat, Magdi A. Koutb, and Hoda S. Sorour, World Academy of Science, Engineering, and Technology WASET Proceedings, vol. 44, pp. 208-212, Venice, Italy, August 2008.
  • “Content-Aware Adaptive Video Streaming System”, Mohammad A. Talaat, Magdi A. Koutb, Hamdy M. Kelash, and Reda H. Aboelez. Published in the proceedings of the following conferences:
  • Information and Communications Technologies ICT 2005, Cape Town, South Africa, May 2005.
  • International Conference on Information and Communications Technologies ICICT 2005, Cairo, Egypt, Dec. 2005.