Fundamentals of Network Security
3.5 (106 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
13,274 students enrolled

Fundamentals of Network Security

Concept on network Security, OSI model, Network Attack and protection
3.5 (132 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
13,274 students enrolled
Last updated 7/2020
English [Auto]
Current price: $13.99 Original price: $19.99 Discount: 30% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 31 mins on-demand video
  • 1 article
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • To identify information security threats
  • To identify the OSI Model layer
  • To identify Network Attack
  • To identify Network Protection Method
  • Basic Understanding of Computer
  • Basic Understanding of Network

Module 1: In this Module you Understand the Concept of Network Security and types of the Network.

Module 2: In this Module you understand about Types of layer in OSI Model such as application layer, data link layer etc.

Module 3: In this module you understand about the Types of network attack, which harm the computer and network system also

Module 4: in this Module you Understand about the Network Protection.

Who this course is for:
  • Engineering Students
  • Computer Diploma Students
  • Science Background Students
Course content
Expand all 7 lectures 31:28
+ What is Computer Network ?
1 lecture 05:10

What is Computer Network ?

A network consists of two or more computers that are linked in order to share resources, exchange files, or allow electronic communications.

Computer networks are divided into five types, namely:

1. LAN ( Local Area Network )

Local Area Network (LAN), is a private property network in a building. LAN is used to connect personal computers and workstations in the office of a company to exchange information.

2. MAN ( Metropolitan Area Network)

Metropolitan Area Network (MAN), basically a larger LAN. MAN can include company offices that are located adjacent to or also located in an area of the city.

3. WAN ( Wide Area Network )

its scope covers a wide geographical area

( covering a country or even a continent ).

4. Internet

The internet is a communication network that connects one electronic media with other media. Supporting technology standards used are the Transmission Control Protocol or Internet Protocol Suite (abbreviated as the term TCP / IP)

5. Wireless Network

relating to communication between computer systems without using cables. This wireless network is often used for computer networks both at close distances (a few meters, using a device / bluetooth transmitter) and at a distance (via satellite). This field is closely related to the fields of telecommunications, information technology, and computer engineering. Popular types of networks in this wireless network category include: Wireless local area networks (wireless LAN / WLAN), and Wi-Fi.

What is Network Security ?

Network security is policies and practices to prevent and monitor access, misuse, and denial of unauthorized modifications that occur on computer networks.

So Network Security Fundamentals are entry-level security that covers the basic concepts of network security

Network security consists of several concepts, namely :

1. Confidentiality

network security is useful for maintaining the confidentiality of company data.

2. Integrity

Maintain data consistency, accuracy, and trust. The data in it must not be changed by people who do not have rights in it.

3. Availability

make improvements to hardware if needed, and maintain the operating system environment.

4. Authenticatin

The sender of the information can be correctly identified and there is a guarantee that the identity obtained is not fake.

5. Nonrepudiation

that neither sending or receiving information cannot deny the sending and receiving of messages.

Preview 05:10
+ Different layer of in OSI Model
1 lecture 08:38

OSI has 7 layers, each layer has a function and has their respective roles

what are they ?

Layer 1: Physical layer

Physical Layer is the first layer in the OSI network reference model. The responsibility is to transmit data bits. it is done from the sender's physical layer and Addressed to the recipient's physical layer.

Layer 2 : Data Link Layer

The Data Link Layer is the second layer from the bottom in the OSI model, which can convert network frames that contain data that detects errors and retransmits failed frames. MAC addresses are also implemented in this layer. some devices such as the Network Interface Card (NIC), layer 2 switches and network bridges also operate here.

Layer 3 : Network Layer

Network Layer has the task of defining IP addresses. This makes each computer can be connected to 1 network. network layer also functions to carry out the routing process and make headers on existing data packages.

Layer 4 : Transport Layer

This layer will break the data into data packages and give serial numbers to the data packages so that they can be rearranged when they reach the destination. at this layer will determine the protocol that will be used to transmit data, for example the TCP protocol. This protocol will send data packets, while also ensuring that the packet is received successfully (acknowledgment), and retransmitting packages that are lost or damaged in the middle of the road.

Layer 5 : Session Layer

Session layer will define how connections can be made, maintained, or destroyed. At this layer there are the Name Recognition, NFS & SMB protocols.

Layer 6 : Presentation Layer

The presentation layer is responsible for the formatting and delivery of information to the application layer for further processing or display. It relieves the application layer of concern regarding syntactical differences in data representation within the end-user systems. An example of a presentation service would be the conversion of an EBCDIC-coded text computer file to an ASCII-coded file.

Layer 7 : Application Layer

Application Layer is an abstraction layer that specifies the shared communications protocols and interface methods used by hosts in a communications network. The application layer abstraction is used in both of the standard models of computer networking: the Internet Protocol Suite (TCP / IP) and the OSI model. Although both models use the same terms for their respective highest level layers, the detailed definitions and purposes are different.

OSI Model
+ Types of Network Attack
1 lecture 03:53

There are many types of attacks on computer networks. The following are some of the attacks most often used by attackers.

1. Spoofing

Spoofing is an attack technique that is carried out by the attacker by falsifying data so that the attacker can look like a trusted host. IP spoofing and ARP spoofing in particular may be used to leverage man-in-the-middle attacks against hosts on a computer network. Spoofing attacks which take advantage of TCP / IP suite protocols may be mitigated with the use of firewalls capable of deep packet inspection or by taking measures to verify the identity of the sender or recipient of a message.

2. DDoS ( Distributed Denial of Service )

DDoS Attack is a type of attack on a computer or server on the internet network by consuming resources (resources) that are owned by the computer. So the computer cannot perform its functions by actually being used to save other users to gain access to computers that are the attacked.

3. Sniffing Attack

Sniffing Attack is a data theft technique by monitoring and analyzing each packet of data that is transmitted from the client to the server.

4. SQL Injection

SQL Injection is an attack technique that utilizes website security that allows users to enter data without filtering out malicious characters so that attackers can get access to the application database. Inputs are usually entered into certain parts of the website that are related to the site database.

5. Trojan Horse

Trojan Horse in computer security is an attack that can damage a network or system. With a Trojan horse attack, an attacker can gain access rights to the target and used to find information from the target

Types of network Attack
+ Types of network Protection
2 lectures 12:10

After learning types of network attacks, we must also know how to secure a network. Here are some simple things that are useful for protecting the network

1. Physical Security

Physical security describes security measures that are designed to deny unauthorized access to facilities, equipment and resources and to protect personnel and property from damage or harm (such as espionage, theft, or terrorist attacks). Physical security involves the use of multiple layers of interdependent systems that can include CCTV surveillance, security guards, protective barriers, locks, access control, perimeter intrusion detection, deterrent systems, fire protection, and other systems designed to protect persons and property.

2. Unified Threat Managemen (UTM)

Unified threat management is an approach to information security where a single hardware or software installation provides multiple security functions. UTM must have a minimum of several converging security features, which is a firewall, Intrusion detection, Intrusion Prevention.

- Firewall is a computer network security system that functions to protect computers from various types of attacks from outside computers. A firewall works by monitoring and controlling all incoming and outgoing network traffic that you do based on established security rules.

- IDS ( Intrusion Detection system ) is a methods that can be used to support suggested activities in the system or network.

- IPS ( Intrusion Prevention System ) is software that works behind a firewall to identify and block threats to the network by assessing every packet that passes based on the network protocol in the application and tracking threats to network security.

Network Protection: Hardware and Software
Network Protection Method
+ Conclusion
1 lecture 00:53

Conclusion of the Course

Conclusion of the Course
+ Quiz
0 lectures 00:00

Now it is Quiz time, Just enjoy Quiz.

10 questions