Fundamentals of Network Security
What you'll learn
- Students will be able to Describe, compare and identify various network concepts Fundamentals of TCP/IP Describe and compare fundamental security concepts Describe network applications and the security challenges Understand basic cryptography principles
Requirements
- Students should have basic networking knowledge
- Students should have basic cyber security knowledge
Description
By the end of this course you will be fully aware of the wired and wireless computer networks basics, devices, network based vulnerabilities and protocols in a step-by-step pace. You will also reach the professional level in networks security in terms of concepts, technologies, and tools. The course requires no background or pre-requisite, yet you will be able to understand all the up-to-date terminologies in the networks security during the lectures.
This course is organized as follows:
- Section 1: Introduction Lecture
- 1:
Introduction
-
- Section 2: Understanding the OSI Model The functionality of the OSI Model
- Lecture2: OSI Model
- Lecture3: Data Encapsulation and De-Encapsulation
- Lecture4: TCP/IP Model
- Quiz 1: Section 2 Review Quiz
-
-
- Section 3: Internet Protocol The functionality of the Internet Protocol
- Lecture5: Introduction to the Internet Protocol
- Lecture6: IP Addressing
- Lecture7: IP Address Classes
- Lecture 8: Reserved IP Addresses
- Lecture 9: Public and Private IP Addresses
- Lecture 10: IPv6 Addresses
- Quiz 2: Section 3 Review Quiz
-
- Section 4: Transmission Control Protocol The functionality of Transmission Control Protocol
- Lecture 11: Introduction to Transmission Control Protocol
- Lecture 12: TCP Three-Way Handshake
- Quiz 3: Section 4 Review Quiz
-
- Section 5: User Datagram Protocol The functionality of the User Datagram Protocol
- Lecture 13: Introduction to the User Datagram Protocol
- Lecture 14: TCP and UDP Ports
- Lecture 15: Address Resolution Protocol
- Lecture 16: Host-to-Host Packet Delivery Using TCP
- Lecture 17: Wireshark
- Quiz 4: Section 5 Review Quiz
-
- Section 6: Vulnerabilities Network Vulnerabilities
- Lecture 18: TCP/IP Vulnerabilities (Preview enabled)
- Lecture 19: IP Vulnerabilities
- Lecture 20: ICMP Vulnerabilities
- Lecture 21: TCP Vulnerabilities
- Lecture 22: TCP Session Hijacking
- Lecture 23: UDP Vulnerabilities
Who this course is for:
- Network Analyst, Network Engineers, Network Architects
- Security Analyst, Security Engineers, Security Architects
Instructor
Corey Charles is Security+, Qualys Vulnerability Management Specialist Certified. Mr. Charles has 11 years experience in IT Security with a direct focus in Vulnerability Management. Mr. Charles also taught on the collegiate level, teaching IT Security at Herzing University.
Mr. Charles also holds two Bachelors of Arts Degrees, Digital Design and Media Arts, one Associates, Digital Design from Tulane University. Two Master Degrees from Strayer University, Master of Science in Computer
Security Management and Master of Science in Computer Forensics Management. He holds an Executive Graduate Certification in Computer Networking.