Complete Cyber Security Course: The Network Security A-Z™
4.5 (54 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
7,142 students enrolled

Complete Cyber Security Course: The Network Security A-Z™

Cyber Security In-depth - Network Security Fundamentals (Threat, Vulnerabilities), NMAP, Firewalls & Prevent Attacks
4.5 (54 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
7,142 students enrolled
Created by Teach Apex
Last updated 9/2019
English
English [Auto]
Current price: $13.99 Original price: $19.99 Discount: 30% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 15.5 hours on-demand video
  • 10 downloadable resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Network Fundamentals
  • Network Design Elements and Components
  • Network Security Threats, Vulnerabilities, and Attacks
  • Network Security Controls, Devices and Protocols
  • Introduction to Intrusion Detection System
  • Introduction to Firewalls
  • Introduction to Wireless Network Security
  • Sniffing and Spoofing
  • Network Traffic Monitoring & Analysis
  • Network Scanning
Requirements
  • You should have a basic understanding of computing concepts
  • Please have a look at the curriculum
Description

Become a Network Security Specialist with this exclusive course covering every aspect of Network Security. After this course, you will be able to discover security vulnerabilities across an entire network, by using network hacking techniques and vulnerability scanning.

You will be able to architect your network for maximum security and prevent local and remote attacks. You will understand the various types of firewalls that are available and what threats each helps mitigate.

Explore wireless security, the configurations that are required for maximum security, and why. Learn how Wi-Fi is hacked and how to mitigate those attacks, covering topics from Wireless encryption weaknesses and the latest WPA3 standard.

You will master network monitoring to discover and identify potential hackers, malware, and other adversaries that might be lurking on your network. Using tools like Wireshark and Nmap.

Learn the best ways to reduce the attack surface of your network and harden it for maximum security and privacy. Finally, you will fully understand how to best use IDS and IPS in your network to secure your network.

This Network Security training can be used as a security solution for home-based or any business-sized networks, which makes it an ideal solution for securing networking activities.

After going through this course, you will find yourself at an intermediate level of knowledge regarding network security.

Who this course is for:
  • Any internet user who wants to become an expert in security, privacy, and anonymity.
  • For all levels of internet users who are interested in security, safety, and privacy.
  • This course is for anyone who wants to keep their important files, emails, accounts and personal information out of the hackers.
  • This course is for anyone who wants to become an expert in network security, privacy, and anonymity. This course covers network security attacking and defending techniques.
  • This course is specially designed for the personnel who would love to gain a practical skillset in mitigating the network security attacks such as - Virus, Trojans, Spywares, Keyloggers, DoS/DDoS, Password based attacks etc. by implementing Firewalls/IDS/IPS solutions and implementing a complete Network Vulnerability Assessment plan.
  • This course is ideal for Network Security leaders responsible for applying best practices to secure Network, including those in the following positions: Network Security Administrator, Network Security Auditors, Security Consultant, Security Architect
  • For anyone who would love to gain a practical skillset in mitigating the risk from, malware, Trojans, hackers, trackers, cyber criminals and all online threats.
  • This course is designed for personal and home Internet security, privacy, and anonymity.
Course content
Expand all 94 lectures 15:17:22
+ Module 1: Network Fundamentals
10 lectures 01:49:56
Video 3_Different Types of Networks
13:49
Video 4_Network Components
14:23
Video 2_OSI & TCP/IP Network Models
14:10
Lab1_Find MAC Address & how to Spoof it
10:13
Video 5_Networking Protocols in TCP/IP Protocol Stack (1)
17:53
Video 6_Networking Protocols in TCP/IP Protocol Stack (2)
11:40
Lab2_Find IP Addresses and Spoof Private IP Address Manually
07:50
+ Module 2: Network Design Elements and Components
5 lectures 01:07:08
Video 8_Network Design Elements and Components – Part 1
08:18
Video 9_Network Design Elements and Components – Part 2
16:19
Video 10_Network Design Elements and Components – Part 3
15:07
Video 11_Network Design Elements and Components – Part 4
13:42

This lecture provides an overview of some of the common network design elements and components such as - IoT and Defense in Depth.

Video 11_Network Design Elements and Components – Part 4
13:42
+ Module 3: Network Security Threats, Vulnerabilities, and Attacks
17 lectures 02:56:53

This lecture provides an understanding of some of the basic terms and Goals of Network Security.

Video 12_Essential Terminologies
23:31

In this video, you will learn the basic concepts of Network Security and why it is important and also, you'll understand the basic functions/roles or responsibilities of a Network Security Specialist.

Video 13_Network Security Concerns
06:30

This lecture provides the basic understanding of Network Security Threats and Attacks & the basic difference between External and Internal Network Security Threats.

Video 14_Network Security Threats & Attacks
04:57

In this lecture we will discuss some of the Passive Network Attacks such as - Wiretapping, Port Scan, Idle Scan, Encryption etc.

Video 15_Passive Network Attacks
12:30

In this lecture we will discuss some of the Active Network Attacks such as - Malware Attacks, Eavesdropping, Data Modification, DoS/DDoS Attack, DNS Spoofing etc.

Preview 25:01

In this lecture you will learn how to create a virus using JPS Virus Maker to test your Antivirus if it is properly working or not.

Lab4_Create a Virus using JPS Virus Maker
09:23

In this lecture you will learn how to create HTTP RAT to take remote access of a target machine to learn how trojan horse works.

Lab5_Create HTTP Trojan using HTTP RAT
06:43

In this lecture you will learn how to use Spytech SpyAgent a type of Spyware tool for system monitoring and surveillance, so that you can monitor users activity.

Lab6_How to use Spytech SpyAgent for System Monitoring & Surveillance
16:18

In this practical you will learn how to use All in one Keylogger to capture the key strokes of a target machine.

Lab7_Use Keyloggers to Capture Key Logs
10:39

LOIC is one of the most powerful DOS attacking tools, in this practical you will learn how it works.

Lab8_Perform DoS Attack using LOIC
07:16

In this practical you will learn how to perform DoS Attack using HOIC (High Orbit Ion Cannon) which is very powerful tool used to flood websites by launching a DOS.

Lab9_Perform DoS Attack using HOIC
07:23

In this lecture you will get a practical demonstration based on DoSHttp that is easy to use and powerful HTTP Flood Denial of Service (DoS) Tool.

Lab10_HTTP Flooding using DoSHttp
09:01

Password-based authentication is commonly used in today's computer systems. In this lecture you will learn the technical and non-technical based password attacks.

Video 17_Password Based Attacks
06:00

The default credentials are well known by security administrators and, unfortunately, also by malicious attackers, who can use them to gain access to various devices in your network or applications. In this lab, you will learn about default passwords.

Lab11_How Hackers/Attackers use Default Passwords
06:00

This lecture provides practical demonstration to help you to learn how to use L0htCrack tool to attain and crack the user password from any Windows OS.

Lab12_Cracking/Auditing Windows Passwords using L0phtCrack
13:09

This lecture introduces you to several types of network security vulnerabilities and attacks followed by the description of security measures employed against them.

Video 18_Network Security Vulnerabilities
07:05

This lecture provides a practical demonstration on how to set an account lockout policy in Windows OS. The account lockout policy helps to lock the user's account after a defined number of failed password attempts.

Lab13_How to use Account Lockout Policy in Windows
05:27
+ Module 4: Network Security Controls, Devices and Protocols
10 lectures 01:38:55

This lecture provides an overview of 5 basic elements of Effective Network Security.

Video 19_Elements of Network Security
11:09

This lecture explains User Identification, Authentication, Authorization and Accounting. This video basically covers everything you need to know to identify your users, verify their identities, limit their access, and manage their accounts on an ongoing basis.

Video 20_IAAA
07:51

This lecture provides an overview of Cryptography concepts.

Video 21_Cryptography
10:09

In this lab you will learn how to encrypt and decrypt the data by using Advanced Encryption Package.

Lab14_Data Encryption & Decryption using Advanced Encryption Package
10:41

In this lab you will learn how to dump SAM Hashes using PWDump and crack the Hashes by using Online Hash Crack web application.

Lab15_Dump & Crack SAM Hashes
09:40

This lab provides a practical demonstration based on how to hide sensitive information in an image file using OpenStego.

Lab16_Steganography using OpenStego
07:53

An organization security policy determines how secure or insecure the network and intellectual resources are. In this lecture we'll explain some network security policies which are the basis of security for the network infrastructure of your company.

Video 22_Network Security Policies
05:45

This lecture provides an overview Network Security Devices & other Technologies such as - Firewalls, Load Balancers, Secure Web Gateways etc.

Video 23_Network Security Devices & Other Technologies
11:40

This lab provides practical demonstration based on how to configure TOR Web browser for proxy network so that you can maintain the anonymity.

Lab17_Configure TOR Web Browser for Proxy Network
11:09

PRTG lets you capture network packets by using its built-in protocol analyzer and other analysis tools. PRTG can also classify network traffic by IP address, protocol or user-defined, custom parameters. In this lab you will learn how to work with PRTG Protocol Analyzer.

Lab18_How to work with PRTG Protocol Analyzer
12:58
+ Module 5: Introduction to Intrusion Detection System
7 lectures 01:02:43

This lecture provides an overview of an IDS Systems.

Video 24_Introduction to Intrusion Detection System
04:27
Video 25_Network Intrusions & IDS
09:06

This lecture explains the concept of How IDS Works & what are the Components used in an IDS Systems.

Video 26_How IDS Works & Components
05:08

This lecture explains different types of Intrusion Detection Systems (IDS) like - Network and Host based IDS, Signature-based and Anomaly based IDS.

Video 27_IDS Types
10:31

This video gives an introduction of an Intrusion Prevention System and why we need an IPS in our Network. Also, you'll understand different types of Intrusion Prevention Systems.

Video 28_IPS & its Technologies
10:06

This video introduces you to several IDS/IPS Solutions.

Video 29_IDS-IPS Solutions
08:14

This lab provides you hands-on experience on how to detect intrusions in your network by using Snort.

Lab19_Detecting Intrusions using SNORT
15:11
+ Module 6: Introduction to Firewalls
10 lectures 01:24:30

This lecture introduces you to Firewall, why is it Necessary and what it Does?

Video 30_Firewalls and What it does?
08:07

In this video, you'll learn how does a Firewall work and will introduce you with the Firewall Rules.

Video 31_How Does a Firewall Work?
07:24

In this video, you will learn how to turn on or off in Windows OS.

Lab20_Turn On or Off Windows Firewall
04:07

This lecture provides practical demonstration based on how to allow an app or a feature through Windows Firewall.

Lab21_Allow an App through Windows Firewall
08:28

This lab will provide practical demonstration based on how to create Inbound and Outbound Windows Firewall Rules and how to export them to use in another machine.

Lab22_Create Inbound and Outbound Windows Firewall Rules
15:46

This lecture explains different types of Firewall Generations such as - Packet Filtering Firewalls, Stateful Inspection Firewalls, Application Level Gateways and Circuit Level Gateways.

Video 32_Firewalls Generations & Types - Part 1
11:49

Next Generation Firewalls offer a deep-packet inspection function that goes beyond simple port and protocol inspection by inspecting the data carried in network packets. In this video, you will learn about Next Generation Firewalls, Unified threat Management (UTM) and Threat Focused NGFW.

Video 33_Firewalls Generations & Types - Part 2
05:58

This lecture will introduce you with Firewall Limitations.

Video 34_Firewall Limitations
07:58

In this lecture you'll get to know what are the biggest Firewall threats and vulnerabilities are so you can put some countermeasures in place to minimize your network security risks.

Video 35_Firewall Threats & Vulnerabilities
08:35

This lecture explains Firewall Security Recommendations and Best Practices for organizing your firewall rules for maximizing traffic speed and maintaining the security.

Video 36_Firewall Security Recommendations and Best Practices
06:18
+ Module 7: Introduction to Wireless Network Security
8 lectures 01:09:10

This lecture introduces you with the problem with public Wi-Fi Networks that can be found in popular public places like airports, coffee shops, malls, restaurants, and hotels that allows you to access the Internet for free.

Video 37_Introduction to Wireless Network Security
05:58

This lecture provides an overview of Wireless Networks and what are the important terms used in Wireless Networks.

Video 38_Wireless Networks
07:47

This lecture introduces you with the IEEE 802.11 Wireless Network Standards with their speed, transmission ranges, and frequency used.

Video 39_Wireless Network Standards
06:59

This lecture explains several Wi-Fi Threats & Vulnerabilities such as - Rogue Access Points/Ad Hoc Networks, Denial of Service Attacks, Configuration Problems etc.

Video 40_Wi-Fi Threats & Vulnerabilities
16:55

This lecture explains wireless security protocols include WEP, WPA, and WPA2, each with their own strengths and weaknesses. This lecture also introduces the next Generation of Wi-Fi Security i.e. WPA3.

Video 41_Wireless Network Security Standards
08:40

In this video you will learn about Wireless Security Testing and its benefits.

Video 42_Wireless Security Testing
06:52

In this video you will learn how to crack WEP, WPA or WPA2 wireless network pre-shared key using Aircrack-ng in Linux Based OS.

Lab23_Cracking WPA/WPA2 Wireless Network using Aircrack-ng
11:16

This lecture introduces some of the most important points that needs to consider while configuring Wireless Network Securely.

Video 43_Wireless Secure Configuration and Network Isolation
04:43
+ Module 8: Sniffing and Spoofing
9 lectures 01:29:39

This lecture focuses on a wider hacking approach called Network Sniffing, which is very commonly used by prying hackers. How Packet Sniffer works and what are the protocols vulnerable for sniffing.

Video 44_Sniffing Concepts
14:46

This lecture explains Passive and Active Sniffing. Also, it introduces different types of Active Sniffing such as - ARP Poisoning, MAC Flooding, DHCP Attacks and DNS Cache Poisoning.

Video 45_Types of Sniffing
09:29

This lecture introduces the common tools that are used in Network Sniffing.

Video 46_Sniffing Network Traffic
06:10

In this video you will learn how to sniff network wireless traffic using Omni Peek Network Analyzer which lets you check the performance of your connectivity and discover areas that consume bandwidth the most. Also, you can monitor your network for any malicious activity.

Lab24_Sniffing Wireless Traffic using Omni Peek Network Analyzer
13:25
Lab25_Sniffing the Network using TCPDump
06:56

WinDump is a command line tool for Windows that lets you sniff network traffic.

Lab26_Sniffing the Network using WinDump
14:39

In this video you will learn about Wireshark, the most powerful tool that is used for Network Packet Sniffing, Packet Capturing and Analyzing.

Video 47_Packet hunting with Wireshark
01:55
Lab27_Sniffing Network Packets to capture User Credentials using Wireshark
12:33

This video explains the concept of Spoofing and various Network Traffic Spoofing techniques.

Video 48_Spoofing Concepts
09:46
+ Module 9: Network Traffic Monitoring & Analysis
4 lectures 38:24

This lecture provides an overview of Network Traffic Monitoring concepts and the Key Objective behind Monitoring Network Traffic.

Video 49_Network Traffic Monitoring
08:46

This lecture introduces the student to Wireshark and TCPDump and how these tools are used to dissect various network protocols and identify and extract suspect payloads.

Video 50_Network Traffic Analysis
03:58

This lecture provides practical demonstration on how to use TCPDump for network traffic analysis.

Lab28_Network Traffic Analysis using TCPDump
08:09

This video gives practical demonstration on how to do network traffic analysis using Wireshark and will learn about the features of Wireshark.

Lab29_Network Traffic Analysis using Wireshark
17:31
+ Module 10: Network Scanning
14 lectures 02:00:04

This lecture introduces you with the Network Scanning basics and its objective. Also, we'll explain the concept of Three-Way Handshake and 6-TCP Communication Flags.

Video 51_Network Scanning basics
20:26

This lecture provides you hands-on experience with Colasoft Packet Builder.

Lab30_Creating Custom Packet using Colasoft Packet Builder
11:17

In this video, you will learn how to check for live systems by using Ping and Ping Sweep methods.

Video 52_Check for Live Systems by using Ping, Ping Sweep
05:16

In this video you will learn how to check for live systems in your network using Nmap.

Lab31_Check for Live Systems using Nmap
05:49

Nmap is one of the most commonly used tools for Network Scanning. In this video, you will learn how to check for open and closed ports by using Nmap and what are the 6 port states of Nmap.

Video 53_Check for Open and Closed Ports using Nmap
10:04

This video gives you practical knowledge on how to use Nmap to check for open and closed ports in the live systems.

Lab32_Check for Open and Closed Ports using Nmap
11:03

In this lecture you will learn a variety of scans that can be performed using Nmap such as - TCP Connect / Full Open Scan, Stealth Scan (Half open Scan), XMAS Scan, FIN Scan, NULL Scan and IDLE Scan.

Video 54_Nmap Scan Techniques - Part 1
11:59
Video 55_Nmap Scan Techniques - Part 2
03:50

This video helps to learn how to use different network scanning techniques and the commands using Nmap.

Lab33_Exploring various Network Scanning Techniques
05:37
Video 56_Nmap Scripting Engine (NSE)
06:07
Lab34_Work with Nmap Scripting Engine (NSE)
08:12
Video 57_Vulnerability Scanning
04:19
Lab35_Banner Grabbing using Nmap
04:03

Nsauditor is a network security scanner that allows to audit and monitor network for possible vulnerabilities, checks methods that a hacker might use to attack it. In this lab you will learn how to scan a network for possible vulnerabilities using Nsauditor.

Lab36_Network Vulnerability Scanning using NSAuditor
12:02