We guarantee that all our online courses will meet or exceed your
expectations. If you are not fully satisfied with a course - for
any reason at all - simply request a full refund. We guarantee no
hassles. That's our promise to you.
Go ahead and order with confidence!
| Introduction | |||
| Introduction | |||
| Section 01: An Introduction to Computer Networks | |||
| 1.1 Computer Network | |||
| 1.2 Computer Network Topologies | |||
| 1.3 Categories of Computer Network | |||
| 1.4 Computer Network Devices | |||
| 1.5 Transmission Media | |||
| Section 02: ISO/OSI Model | |||
| 2.1 ISO/OSI Model | |||
| 2.2 Application, Presentation, and Session Layers | |||
| 2.3 Transport and Network Layers | |||
| 2.4 Data Link and Physical Layers | |||
| 2.5 ISO/OSI Model in Action | |||
| Section 03: TCP/IP Protocols | |||
| 3.1 Introduction to Computer Networks Protocols | |||
| 3.2 IP Protocol | |||
| 3.3 TCP and UDP Protocols | |||
| 3.4 Application Protocols | |||
| 3.5 TCP/IP Characteristics and Tools | |||
| Section 04: Wireless Networks | |||
| 4.1 Wireless Networks Benefits | |||
| 4.2 Types of Wireless Networks | |||
| 4.3 Wireless Networks Protocol (Wi-Fi) | |||
| 4.4 Wireless Networks Devices | |||
| 4.5 Wireless Networks Drawbacks | |||
| Section 05: Network Security | |||
| 5.1 Security Goals | |||
| 5.2 Securing the Network Design | |||
| 5.3 TCP/IP Security and Tools | |||
| 5.4 Port Scanning and Tools | |||
| 5.5 Sniffing and Tools | |||
| Section 06: Firewalls and Honeypots | |||
| 6.1 Reasons to Use Firewall | |||
| 6.2 Firewalls Rules | |||
| 6.3 Firewalls Filtering | |||
| 6.4 Honeypots | |||
| 6.5 Bypassing Firewalls | |||
| Section 07: Intrusion Detection and Prevention System | |||
| 7.1 Intrusion Detection System: IDS | |||
| 7.2 Network IDS: NIDS | |||
| 7.3 NIDS Challenges | |||
| 7.4 Snort as NIDS | |||
| 7.5 Intrusion Prevention Systems: IPS | |||
| Section 08: Wireless Network Security | |||
| 8.1 Wired Equivalent Privacy WEP Attacking | |||
| 8.2 WPA and AES Protocols | |||
| 8.3 Wireless Security Misconceptions | |||
| 8.4 Wireless Attacks and Mitigation | |||
| 8.5 Secure Network Design with Wireless | |||
| Section 09: Physical Security and Incident Handling | |||
| 9.1 Physical Security Objectives | |||
| 9.2 Physical Threats and Mitigation | |||
| 9.3 Defense in Depth (DiD) | |||
| 9.4 Incident | |||
| 9.5 Incident Handling | |||
| Section 10: Network Security: Conclusion | |||
| 10.1 Confidentiality, Integrity, and Availability (CIA) | |||
| 10.2 Assets, Threats, and Vulnerabilities | |||
| 10.3 Risks and Network Intrusion | |||
| 10.4 Common Attacks | |||
| 10.5 Security Recommendations | |||