×
Order Processing
Checkout
Full Name:
Email address:
Password:
Retype Password:
Existing User
Existing User
Continue
Exclusive features inside this offer:
30 Days Money Back Guarantee
Instant Certificate of Completion
Lifetime Access
Get up to date Information
Practical Knowledge
Best Teaching Methodology
Quick access, anytime & anywhere
Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Network Security
Course Introduction
Introduction (9:57)
Section 1: Introduction to Computer Networks
Lecture 1: What is a Computer Network? (10:29)
Lecture 2: Computer Networks Typologies (11:06)
Lecture 3: Computer Networks Categories (9:47)
Lecture 4: Computer Networks Devices and Services (9:19)
Lecture 5: Computer Networks Transmission Media (10:38)
Section 2: ISO/OSI Model (7 Layers)
Lecture 1: Why ISO/OSI Model? (9:56)
Lecture 2: Application, Presentation, and Session Layers (11:50)
Lecture 3: Transport and Network Layers (10:46)
Lecture 4: Data Link and Physical Layers (8:32)
Lecture 5: ISO/OSI Model in Action (10:04)
Section 3: TCP/IP Protocol Suite
Lecture 1: Introduction to Computer Networks Protocols (10:41)
Lecture 2: IP Protocol (12:53)
Lecture 3: TCP and UDP Protocols (12:28)
Lecture 4: Application Protocols (11:36)
Lecture 5: TCP/IP Characteristics and Tools (10:39)
Section 4: Wireless Networks
Lecture 1: Wireless Networks Benefits (9:19)
Lecture 2: Wireless Networks Types (12:14)
Lecture 3: Wireless Networks Protocol (Wi-Fi) (6:47)
Lecture 4: Wireless Networks Devices (10:28)
Lecture 5: Wireless Networks Drawbacks (9:23)
Section 5: Computer Networks Security
Lecture 1: Security Goals (8:53)
Lecture 2: Securing the Network Design (10:07)
Lecture 3: TCP/IP Security and Tools (11:50)
Lecture 4: Port Scanning and Tools (11:15)
Lecture 5: Sniffing and Tools (10:18)
Section 6: Firewalls and Honeypots
Lecture 1: Why Using a Firewall? (12:49)
Lecture 2: Firewalls Rules (10:31)
Lecture 3: Firewalls Filtering (8:33)
Lecture 4: Honey Pots (6:42)
Lecture 5: Bypassing Firewalls (8:00)
Section 7: Intrusion Detection and Prevention systems (IDS/IPS)
Lecture 1: What is Intrusion Detection Systems (IDS)? (11:16)
Lecture 2: Network IDS (NIDS) (6:08)
Lecture 3: NIDS Challenges (8:55)
Lecture 4: Snort as NIDS (8:20)
Lecture 5: Intrusion Prevention Systems (IPS) (7:21)
Section 8: Wireless Networks Security
Lecture 1: Wired Equivalent Privacy WEP Attacking (10:40)
Lecture 2: WPA and AES Protocols (8:31)
Lecture 3: Wireless Security Misconceptions (8:39)
Lecture 4: Wireless Attacks and Mitigation (9:08)
Lecture 5: Secure Network Design with Wireless (8:41)
Section 9: Physical Security & Incident Handling
Lecture 1: Physical Security Objectives (10:45)
Lecture 2: Physical Threats and Mitigation (10:50)
Lecture 3: Defense in Depth (DiD) (7:18)
Lecture 4: What is an Incident? (5:40)
Lecture 5: Incident Handling (13:50)
Section 10: Computer Networks Security Conclusion
Lecture 1: Confidentiality, Integrity, and Availability (CIA) (6:10)
Lecture 2: Assets, Threats, and Vulnerabilities (4:10)
Lecture 3: Risks and Network Intrusion (5:36)
Lecture 4: Common Attacks (8:46)
Lecture 5: Security Recommendations (6:18)
Lecture 1: What is Intrusion Detection Systems (IDS)?
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock