Computer Networks Security from Scratch to Advanced
4.3 (1,548 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
69,613 students enrolled

Computer Networks Security from Scratch to Advanced

Computer Networks Security Technologies and Tools for Network Admins and Cyber Security Officers
4.3 (1,548 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
69,613 students enrolled
Created by Mohammad Adly
Last updated 10/2017
English
English [Auto]
Current price: $104.99 Original price: $149.99 Discount: 30% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 8 hours on-demand video
  • 51 downloadable resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Introduction to Computer Networks
  • ISO/OSI Model (7 Layers)
  • TCP/IP Protocol Suite
  • Wireless Networks
  • Computer Networks Security
  • Firewalls and Honeypots
  • Intrusion Detection and Prevention systems (IDS/IPS)
  • Wireless Networks Security
  • Physical Security & Incident Handling
  • Computer Networks Security Recommendations
Requirements
  • Basic computer knowledge
  • Basic Internet skills and adequate connection
  • Beginner networking background
  • Microsoft Windows machine
  • Microsoft Power Point for the presentation material
  • Beginner cyber security information
  • Laptop machine and standard browser
Description

By the end of this course you will be fully aware of the wired and wireless computer networks basics, devices, and protocols in a step-by-step pace. You will also reach the professional level in networks security in terms of concepts, technologies, and tools. The course requires no background or pre-requisite, yet you will be able to understand all the up-to-date terminologies in the networks security during the lectures.

This course is organized as follows:

Section One: introduction to Computer Networks

  • Lecture 1: What is a Computer Network?
  • Lecture 2: Computer Networks Topologies
  • Lecture 3: Computer Networks Categories
  • Lecture 4: Computer Networks Devices and Services
  • Lecture 5: Computer Networks Transmission Media

Section Two: ISO/OSI Model (7 Layers)

  • Lecture 1: Why ISO/OSI Model?
  • Lecture 2: Application, Presentation, and Session Layers
  • Lecture 3: Transport and Network Layers
  • Lecture 4: Data Link and Physical Layers
  • Lecture 5: ISO/OSI Model in Action

Section Three: TCP/IP Protocol Suite

  • Lecture 1: Introduction to Computer Networks Protocols
  • Lecture 2: IP Protocol
  • Lecture 3: TCP and UDP Protocols
  • Lecture 4: Application Protocols
  • Lecture 5: TCP/IP Characteristics and Tools

Section Four: Wireless Networks

  • Lecture 1: Wireless Networks Benefits
  • Lecture 2: Wireless Networks Types
  • Lecture 3: Wireless Networks Protocol (Wi-Fi)
  • Lecture 4: Wireless Networks Devices
  • Lecture 5: Wireless Networks Drawbacks

Section Five: Computer Networks Security

  • Lecture 1: Security Goals
  • Lecture 2: Securing the Network Design
  • Lecture 3: TCP/IP Security and Tools
  • Lecture 4: Port Scanning and Tools
  • Lecture 5: Sniffing and Tools

Section Six: Firewalls and Honeypots

  • Lecture 1: Why Using a Firewall?
  • Lecture 2: Firewalls Rules
  • Lecture 3: Firewalls Filtering
  • Lecture 4: Honey Pots
  • Lecture 5: Bypassing Firewalls

Section Seven: Intrusion Detection and Prevention systems (IDS/IPS)

  • Lecture 1: What is Intrusion Detection Systems (IDS)?
  • Lecture 2: Network IDS (NIDS)
  • Lecture 3: NIDS Challenges
  • Lecture 4: Snort as NIDS
  • Lecture 5: Intrusion Prevention Systems (IPS)

Section Eight: Wireless Networks Security

  • Lecture 1: Wired Equivalent Privacy WEP Attacking
  • Lecture 2: WPA and AES Protocols
  • Lecture 3: Wireless Security Misconceptions
  • Lecture 4: Wireless Attacks and Mitigation
  • Lecture 5: Secure Network Design with Wireless

Section Nine: Physical Security & Incident Handling

  • Lecture 1: Physical Security Objectives
  • Lecture 2: Physical Threats and Mitigation
  • Lecture 3: Defense in Depth (DiD)
  • Lecture 4: What is an Incident?
  • Lecture 5: Incident Handling

Section Ten: Computer Networks Security Conclusion

  • Lecture 1: Confidentiality, Integrity, and Availability (CIA)
  • Lecture 2: Assets, Threats, and Vulnerabilities
  • Lecture 3: Risks and Network Intrusion
  • Lecture 4: Common Attacks
  • Lecture 5: Security Recommendations
Who this course is for:
  • Network administrators
  • Cyber security officers
  • Computer science undergraduates
  • Computer engineering undergraduates
  • Network security postgraduates
  • Network technical support specialists
  • Security incident handlers
  • IT Engineers and CEOs
  • Software Developers
  • Web Developers
  • Mobile Applications Developers
Course content
Expand all 51 lectures 08:04:52
+ Introduction to Computer Networks
6 lectures 01:01:16
Computer Networks Topologies
11:06
Computer Networks Categories
09:47
Computer Networks Devices and Services
10:38
Computer Networks Transmission Media
09:19

Tests your information about Section One

Quiz on Section One
5 questions
+ ISO/OSI Model (7 Layers)
5 lectures 51:08
Why ISO/OSI Model?
09:56
Application, Presentation, and Session Layers
11:50
Transport and Network Layers
10:46
Data Link and Physical Layers
08:32
ISO/OSI Model in Action
10:04

Test your information about Section Two

Quiz on Section Two
5 questions
+ TCP/IP Protocol Suite
5 lectures 58:17
Introduction to Computer Networks Protocols
10:41
IP Protocol
12:53
TCP and UDP Protocols
12:28
Application Protocols
11:36
TCP/IP Characteristics and Tools
10:39

Test your information about Section Three

Quiz on Section Three
5 questions
+ Wireless Networks
5 lectures 48:11
Wireless Networks Benefits
09:19
Wireless Networks Types
12:14
Wireless Networks Protocol (Wi-Fi)
06:47
Wireless Networks Devices
10:28
Wireless Networks Drawbacks
09:23

Test your information about Section Four

Quiz on Section Four
5 questions
+ Computer Networks Security
5 lectures 52:23
Security Goals
08:53
Securing the Network Design
10:07
TCP/IP Security and Tools
11:50
Port Scanning and Tools
11:15
Sniffing and Tools
10:18

Test your information about Section Five

Quiz on Section Five
5 questions
+ Firewalls and Honeypots
5 lectures 46:35
Why Using a Firewall?
12:49
Firewalls Rules
10:31
Firewalls Filtering
08:33
Honeypots
06:42
Bypassing Firewalls
08:00

Test your information about Section Six

Quiz on Section Six
5 questions
+ Intrusion Detection and Prevention Systems (IDS/IPS)
5 lectures 42:00
What is Intrusion Detection Systems (IDS)?
11:16
Network IDS (NIDS)
06:08
NIDS Challenges
08:55
Snort as NIDS
08:20
Intrusion Prevention Systems (IPS)
07:21

Test your information about Section Seven

Quiz on Section Seven
5 questions
+ Wireless Networks Security
5 lectures 45:39
Wired Equivalent Privacy WEP Attacking
10:40
WPA and AES Protocols
08:31
Wireless Security Misconceptions
08:39
Wireless Attacks and Mitigation
09:08
Secure Network Design with Wireless
08:41

Test your information on Section Eight

Quiz on Section Eight
5 questions
+ Physical Security and Incident Handling
5 lectures 48:23
Physical Security Objectives
10:45
Physical Threats and Mitigation
10:50
Defense in Depth (DiD)
07:18
What is an Incident?
05:40
Incident Handling
13:50

Test your information on Section Nine

Quiz on Section Nine
5 questions
+ Computer Networks Security Conclusion
5 lectures 31:00
Confidentiality, Integrity, and Availability (CIA)
06:10
Assets, Threats, and Vulnerabilities
04:10
Risks and Network Intrusion
05:36
Common Attacks
08:46
Security Recommendations
06:18

Test your information about Section Ten

Quiz on Section Ten
5 questions

This exam tests your overall comprehension of this course, and stresses on the data you need to come out with from it.

Final Exam
60 questions