Understanding and Navigating Network Security: From A-Z
This course introduces computer networks security technologies and tools for network admins and cybersecurity officers and makes you fully aware of the wired and wireless computer network's basics, devices, and protocols at a step-by-step pace.
1
Segment - 01 - What is a Computer Network?
Segment - 02 - Computer Networks Topologies
Segment - 03 - Computer Networks Categories
Segment - 04 - Computer Networks Devices and Services
Segment - 05 - Computer Networks Transmission Media
2
Segment - 06 - Why ISO/OSI Model?
Segment - 07 - Application, Presentation, and Session Layers
Segment - 08 - Transport and Network Layers
Segment - 09 - Data Link and Physical Layers
Segment - 10 - ISO/OSI Model in Action
3
Segment - 11 - Introduction to Computer Networks Protocols
Segment - 12 - IP Protocol
Segment - 13 - TCP and UDP Protocols
Segment - 14 - Application Protocols
Segment - 15 - TCP/IP Characteristics and Tools
4
Segment - 16 - Wireless Networks Benefits
Segment - 17 - Wireless Networks Types
Segment - 18 - Wireless Networks Protocol (Wi-Fi)
Segment - 19 - Wireless Networks Devices
Segment - 20 - Wireless Networks Drawbacks
5
Segment - 21 - Security Goals
Segment - 22 - Securing the Network Design
Segment - 23 - TCP/IP Security and Tools
Segment - 24 - Port Scanning and Tools
Segment - 25 - Sniffing and Tools
6
Segment - 26 - Why Using a Firewall?
Segment - 27 - Firewalls Rules
Segment - 28 - Firewalls Filtering
Segment - 29 - Honeypots
Segment - 30 - Bypassing Firewalls
7
Segment - 31 - What is Intrusion Detection Systems (IDS)?
Segment - 32 - Network IDS (NIDS)
Segment - 33 - NIDS Challenges
Segment - 34 - Snort as NIDS
Segment - 35 - Intrusion Prevention Systems (IPS)
8
Segment - 36 - Wired Equivalent Privacy WEP Attacking
Segment - 37 - WPA and AES Protocols
Segment - 38 - Wireless Security Misconceptions
Segment - 39 - Wireless Attacks and Mitigation
Segment - 40 - Secure Network Design with Wireless
9
Segment - 41 - Physical Security Objectives
Segment - 42 - Physical Threats and Mitigation
Segment - 43 - Defense in Depth (DiD)
Segment - 44 - What is an Incident?
Segment - 45 - Incident Handling
10
Segment - 46 - Confidentiality, Integrity, and Availability (CIA)
Segment - 47 - Assets, Threats, and Vulnerabilities
Segment - 48 - Risks and Network Intrusion
Segment - 49 - Common Attacks
Segment - 50 - Security Recommendations