Udemy
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Development
Web Development Data Science Mobile Development Programming Languages Game Development Database Design & Development Software Testing Software Engineering Development Tools No-Code Development
Business
Entrepreneurship Communications Management Sales Business Strategy Operations Project Management Business Law Business Analytics & Intelligence Human Resources Industry E-Commerce Media Real Estate Other Business
Finance & Accounting
Accounting & Bookkeeping Compliance Cryptocurrency & Blockchain Economics Finance Finance Cert & Exam Prep Financial Modeling & Analysis Investing & Trading Money Management Tools Taxes Other Finance & Accounting
IT & Software
IT Certification Network & Security Hardware Operating Systems Other IT & Software
Office Productivity
Microsoft Apple Google SAP Oracle Other Office Productivity
Personal Development
Personal Transformation Personal Productivity Leadership Career Development Parenting & Relationships Happiness Esoteric Practices Religion & Spirituality Personal Brand Building Creativity Influence Self Esteem & Confidence Stress Management Memory & Study Skills Motivation Other Personal Development
Design
Web Design Graphic Design & Illustration Design Tools User Experience Design Game Design Design Thinking 3D & Animation Fashion Design Architectural Design Interior Design Other Design
Marketing
Digital Marketing Search Engine Optimization Social Media Marketing Branding Marketing Fundamentals Marketing Analytics & Automation Public Relations Advertising Video & Mobile Marketing Content Marketing Growth Hacking Affiliate Marketing Product Marketing Other Marketing
Lifestyle
Arts & Crafts Beauty & Makeup Esoteric Practices Food & Beverage Gaming Home Improvement Pet Care & Training Travel Other Lifestyle
Photography & Video
Digital Photography Photography Portrait Photography Photography Tools Commercial Photography Video Design Other Photography & Video
Health & Fitness
Fitness General Health Sports Nutrition Yoga Mental Health Dieting Self Defense Safety & First Aid Dance Meditation Other Health & Fitness
Music
Instruments Music Production Music Fundamentals Vocal Music Techniques Music Software Other Music
Teaching & Academics
Engineering Humanities Math Science Online Education Social Science Language Teacher Training Test Prep Other Teaching & Academics
AWS Certification Microsoft Certification AWS Certified Solutions Architect - Associate AWS Certified Cloud Practitioner CompTIA A+ Cisco CCNA Amazon AWS CompTIA Security+ Microsoft AZ-900
Graphic Design Photoshop Adobe Illustrator Drawing Digital Painting InDesign Character Design Canva Figure Drawing
Life Coach Training Neuro-Linguistic Programming Personal Development Personal Transformation Mindfulness Life Purpose Meditation CBT Emotional Intelligence
Web Development JavaScript React CSS Angular PHP Node.Js WordPress Vue JS
Google Flutter Android Development iOS Development React Native Swift Dart Programming Language Mobile Development Kotlin SwiftUI
Digital Marketing Google Ads (Adwords) Social Media Marketing Google Ads (AdWords) Certification Marketing Strategy Internet Marketing YouTube Marketing Email Marketing Retargeting
Microsoft Power BI SQL Tableau Business Analysis Data Modeling Business Intelligence MySQL Data Analysis Blockchain
Business Fundamentals Entrepreneurship Fundamentals Business Strategy Business Plan Startup Freelancing Online Business Blogging Home Business
Unity Game Development Fundamentals Unreal Engine C# 3D Game Development C++ 2D Game Development Unreal Engine Blueprints Blender
30-Day Money-Back Guarantee
IT & Software Network & Security Network Security

Computer Networks Security from Scratch to Advanced

Computer Networks Security Technologies and Tools for Network Admins and Cyber Security Officers
Rating: 4.4 out of 54.4 (2,057 ratings)
91,889 students
Created by Mohammad Adly
Last updated 10/2017
English
English [Auto]
30-Day Money-Back Guarantee

What you'll learn

  • Introduction to Computer Networks
  • ISO/OSI Model (7 Layers)
  • TCP/IP Protocol Suite
  • Wireless Networks
  • Computer Networks Security
  • Firewalls and Honeypots
  • Intrusion Detection and Prevention systems (IDS/IPS)
  • Wireless Networks Security
  • Physical Security & Incident Handling
  • Computer Networks Security Recommendations

Requirements

  • Basic computer knowledge
  • Basic Internet skills and adequate connection
  • Beginner networking background
  • Microsoft Windows machine
  • Microsoft Power Point for the presentation material
  • Beginner cyber security information
  • Laptop machine and standard browser

Description

By the end of this course you will be fully aware of the wired and wireless computer networks basics, devices, and protocols in a step-by-step pace. You will also reach the professional level in networks security in terms of concepts, technologies, and tools. The course requires no background or pre-requisite, yet you will be able to understand all the up-to-date terminologies in the networks security during the lectures.

This course is organized as follows:

Section One: introduction to Computer Networks

  • Lecture 1: What is a Computer Network?
  • Lecture 2: Computer Networks Topologies
  • Lecture 3: Computer Networks Categories
  • Lecture 4: Computer Networks Devices and Services
  • Lecture 5: Computer Networks Transmission Media

Section Two: ISO/OSI Model (7 Layers)

  • Lecture 1: Why ISO/OSI Model?
  • Lecture 2: Application, Presentation, and Session Layers
  • Lecture 3: Transport and Network Layers
  • Lecture 4: Data Link and Physical Layers
  • Lecture 5: ISO/OSI Model in Action

Section Three: TCP/IP Protocol Suite

  • Lecture 1: Introduction to Computer Networks Protocols
  • Lecture 2: IP Protocol
  • Lecture 3: TCP and UDP Protocols
  • Lecture 4: Application Protocols
  • Lecture 5: TCP/IP Characteristics and Tools

Section Four: Wireless Networks

  • Lecture 1: Wireless Networks Benefits
  • Lecture 2: Wireless Networks Types
  • Lecture 3: Wireless Networks Protocol (Wi-Fi)
  • Lecture 4: Wireless Networks Devices
  • Lecture 5: Wireless Networks Drawbacks

Section Five: Computer Networks Security

  • Lecture 1: Security Goals
  • Lecture 2: Securing the Network Design
  • Lecture 3: TCP/IP Security and Tools
  • Lecture 4: Port Scanning and Tools
  • Lecture 5: Sniffing and Tools

Section Six: Firewalls and Honeypots

  • Lecture 1: Why Using a Firewall?
  • Lecture 2: Firewalls Rules
  • Lecture 3: Firewalls Filtering
  • Lecture 4: Honey Pots
  • Lecture 5: Bypassing Firewalls

Section Seven: Intrusion Detection and Prevention systems (IDS/IPS)

  • Lecture 1: What is Intrusion Detection Systems (IDS)?
  • Lecture 2: Network IDS (NIDS)
  • Lecture 3: NIDS Challenges
  • Lecture 4: Snort as NIDS
  • Lecture 5: Intrusion Prevention Systems (IPS)

Section Eight: Wireless Networks Security

  • Lecture 1: Wired Equivalent Privacy WEP Attacking
  • Lecture 2: WPA and AES Protocols
  • Lecture 3: Wireless Security Misconceptions
  • Lecture 4: Wireless Attacks and Mitigation
  • Lecture 5: Secure Network Design with Wireless

Section Nine: Physical Security & Incident Handling

  • Lecture 1: Physical Security Objectives
  • Lecture 2: Physical Threats and Mitigation
  • Lecture 3: Defense in Depth (DiD)
  • Lecture 4: What is an Incident?
  • Lecture 5: Incident Handling

Section Ten: Computer Networks Security Conclusion

  • Lecture 1: Confidentiality, Integrity, and Availability (CIA)
  • Lecture 2: Assets, Threats, and Vulnerabilities
  • Lecture 3: Risks and Network Intrusion
  • Lecture 4: Common Attacks
  • Lecture 5: Security Recommendations

Who this course is for:

  • Network administrators
  • Cyber security officers
  • Computer science undergraduates
  • Computer engineering undergraduates
  • Network security postgraduates
  • Network technical support specialists
  • Security incident handlers
  • IT Engineers and CEOs
  • Software Developers
  • Web Developers
  • Mobile Applications Developers

Course content

10 sections • 51 lectures • 8h 4m total length

  • Preview09:57
  • Preview10:29
  • Computer Networks Topologies
    11:06
  • Computer Networks Categories
    09:47
  • Computer Networks Devices and Services
    10:38
  • Computer Networks Transmission Media
    09:19
  • Quiz on Section One
    5 questions

  • Why ISO/OSI Model?
    09:56
  • Application, Presentation, and Session Layers
    11:50
  • Transport and Network Layers
    10:46
  • Data Link and Physical Layers
    08:32
  • ISO/OSI Model in Action
    10:04
  • Quiz on Section Two
    5 questions

  • Introduction to Computer Networks Protocols
    10:41
  • IP Protocol
    12:53
  • TCP and UDP Protocols
    12:28
  • Application Protocols
    11:36
  • TCP/IP Characteristics and Tools
    10:39
  • Quiz on Section Three
    5 questions

  • Wireless Networks Benefits
    09:19
  • Wireless Networks Types
    12:14
  • Wireless Networks Protocol (Wi-Fi)
    06:47
  • Wireless Networks Devices
    10:28
  • Wireless Networks Drawbacks
    09:23
  • Quiz on Section Four
    5 questions

  • Security Goals
    08:53
  • Securing the Network Design
    10:07
  • TCP/IP Security and Tools
    11:50
  • Port Scanning and Tools
    11:15
  • Sniffing and Tools
    10:18
  • Quiz on Section Five
    5 questions

  • Why Using a Firewall?
    12:49
  • Firewalls Rules
    10:31
  • Firewalls Filtering
    08:33
  • Honeypots
    06:42
  • Bypassing Firewalls
    08:00
  • Quiz on Section Six
    5 questions

  • What is Intrusion Detection Systems (IDS)?
    11:16
  • Network IDS (NIDS)
    06:08
  • NIDS Challenges
    08:55
  • Snort as NIDS
    08:20
  • Intrusion Prevention Systems (IPS)
    07:21
  • Quiz on Section Seven
    5 questions

  • Wired Equivalent Privacy WEP Attacking
    10:40
  • WPA and AES Protocols
    08:31
  • Wireless Security Misconceptions
    08:39
  • Wireless Attacks and Mitigation
    09:08
  • Secure Network Design with Wireless
    08:41
  • Quiz on Section Eight
    5 questions

  • Physical Security Objectives
    10:45
  • Physical Threats and Mitigation
    10:50
  • Defense in Depth (DiD)
    07:18
  • What is an Incident?
    05:40
  • Incident Handling
    13:50
  • Quiz on Section Nine
    5 questions

  • Confidentiality, Integrity, and Availability (CIA)
    06:10
  • Assets, Threats, and Vulnerabilities
    04:10
  • Risks and Network Intrusion
    05:36
  • Common Attacks
    08:46
  • Security Recommendations
    06:18
  • Quiz on Section Ten
    5 questions
  • Final Exam
    60 questions

Instructor

Mohammad Adly
Ph. D. Computer Networks
Mohammad Adly
  • 4.1 Instructor Rating
  • 5,048 Reviews
  • 125,012 Students
  • 5 Courses

Education

Ph. D., “Enhanced Congestion Control for Internet Media Traffic”, Computer Engineering and Sciences Dept., Faculty of Electronic Engineering, Menoufiya University, 2006 - 2013.   

M. Sc., “Video Services for Distant Work in an IP Environment”, Computer Engineering and Sciences Dept., Faculty of Electronic Engineering, Menoufiya University, 2002 - 2005.   

Researcher, IRISA Institute, Rennes I University, France, 2001 - 2002.   

Information Technology Diploma, Information Technology Institute ITI, Computer Networks Dept., 1998 - 1999.   

B. Sc., Communications and Electronics Dept., Faculty of Engineering, Cairo University, 1993 - 1998.   

Certificates

Lean Six Sigma Green Belt, SECC/ITIDA, April 2016.   

Dale Carnegie Certified Instructor, 2015   

GIAC Assessing Wireless Networks GAWN 617, SysAdmin, Audit, Network, Security SANS, 2010.   

GIAC Certified Firewall Analyst GCFW 502, SysAdmin, Audit, Network, Security SANS, 2009.   

GIAC Certified Incident Handler GCIH 504, SysAdmin, Audit, Network, Security SANS, 2009.   

GIAC Security Essentials GSEC 401, SysAdmin, Audit, Network, Security SANS, 2009.   

RITI Advanced Management Program RAMP, Regional Information Technology Institute RITI, 2008.   

Publications

“Enhanced TCP-Friendly Rate Control for Supporting Video Traffic over Internet”, Mohammad A. Talaat, Gamal M. Attiya, and Magdi A. Koutb, Canadian Journal of Electrical and Computer Engineering CJECE, vol. 36, no. 4, 2013.   

“ETFRC: Enhanced TFRC for Media Traffic over Internet”, International Journal of Computer Networks, IJCN, vol. 3, no. 3, pp. 167-177, August 2011.   

“ETFRC: Enhanced TFRC for Media Traffic”, International Journal of Computer Applications, IJCA, vol. 18, no. 6, pp. 1-8, March 2011.   

“PSNR Evaluation for Media Traffic over TFRC”, Mohammad A. Talaat, Magdi A. Koutb, and Hoda S. Sorour, International Journal of Computer Networks & Communications IJCNC, vol. 1, no. 3, pp. 71-76, October 2009.   

“A Survey on Unicast Congestion Control Protocols for Media Traffic”, Mohammad A. Talaat, Magdi A. Koutb, and Hoda S. Sorour, International Journal of Computer Science and Network Security IJCSNS, vol. 9, no. 3, pp. 254-261, March 2009.   

“Congestion Control for Internet Media Traffic”, Mohammad A. Talaat, Magdi A. Koutb, and Hoda S. Sorour, World Academy of Science, Engineering, and Technology WASET Proceedings, vol. 44, pp. 208-212, Venice, Italy, August 2008.   

“Content-Aware Adaptive Video Streaming System”, Mohammad A. Talaat, Magdi A. Koutb, Hamdy M. Kelash, and Reda H. Aboelez. Published in the proceedings of the following conferences:   

Information and Communications Technologies ICT 2005, Cape Town, South Africa, May 2005.   

International Conference on Information and Communications Technologies ICICT 2005, Cairo, Egypt, Dec. 2005.

  • Udemy for Business
  • Teach on Udemy
  • Get the app
  • About us
  • Contact us
  • Careers
  • Blog
  • Help and Support
  • Affiliate
  • Impressum Kontakt
  • Terms
  • Privacy policy
  • Cookie settings
  • Sitemap
  • Featured courses
Udemy
© 2021 Udemy, Inc.