Course curriculum

  • 1

    Module 01: Introduction to Computer Networks

    • Segment - 01 - What is a Computer Network?
    • Segment - 02 - Computer Networks Topologies
    • Segment - 03 - Computer Networks Categories
    • Segment - 04 - Computer Networks Devices and Services
    • Segment - 05 - Computer Networks Transmission Media
  • 2

    Module 02: ISO/OSI Model (7 Layers)

    • Segment - 06 - Why ISO/OSI Model?
    • Segment - 07 - Application, Presentation, and Session Layers
    • Segment - 08 - Transport and Network Layers
    • Segment - 09 - Data Link and Physical Layers
    • Segment - 10 - ISO/OSI Model in Action
  • 3

    Module 03: TCP/IP Protocol Suite

    • Segment - 11 - Introduction to Computer Networks Protocols
    • Segment - 12 - IP Protocol
    • Segment - 13 - TCP and UDP Protocols
    • Segment - 14 - Application Protocols
    • Segment - 15 - TCP/IP Characteristics and Tools
  • 4

    Module 04: Wireless Networks

    • Segment - 16 - Wireless Networks Benefits
    • Segment - 17 - Wireless Networks Types
    • Segment - 18 - Wireless Networks Protocol (Wi-Fi)
    • Segment - 19 - Wireless Networks Devices
    • Segment - 20 - Wireless Networks Drawbacks
  • 5

    Module 05: Computer Networks Security

    • Segment - 21 - Security Goals
    • Segment - 22 - Securing the Network Design
    • Segment - 23 - TCP/IP Security and Tools
    • Segment - 24 - Port Scanning and Tools
    • Segment - 25 - Sniffing and Tools
  • 6

    Module 06: Firewalls and Honeypots

    • Segment - 26 - Why Using a Firewall?
    • Segment - 27 - Firewalls Rules
    • Segment - 28 - Firewalls Filtering
    • Segment - 29 - Honeypots
    • Segment - 30 - Bypassing Firewalls
  • 7

    Module 07: Intrusion Detection and Prevention Systems (IDS/IPS)

    • Segment - 31 - What is Intrusion Detection Systems (IDS)?
    • Segment - 32 - Network IDS (NIDS)
    • Segment - 33 - NIDS Challenges
    • Segment - 34 - Snort as NIDS
    • Segment - 35 - Intrusion Prevention Systems (IPS)
  • 8

    Module 08: Wireless Networks Security

    • Segment - 36 - Wired Equivalent Privacy WEP Attacking
    • Segment - 37 - WPA and AES Protocols
    • Segment - 38 - Wireless Security Misconceptions
    • Segment - 39 - Wireless Attacks and Mitigation
    • Segment - 40 - Secure Network Design with Wireless
  • 9

    Module 09: Physical Security and Incident Handling

    • Segment - 41 - Physical Security Objectives
    • Segment - 42 - Physical Threats and Mitigation
    • Segment - 43 - Defense in Depth (DiD)
    • Segment - 44 - What is an Incident?
    • Segment - 45 - Incident Handling
  • 10

    Module 10: Computer Networks Security Conclusion

    • Segment - 46 - Confidentiality, Integrity, and Availability (CIA)
    • Segment - 47 - Assets, Threats, and Vulnerabilities
    • Segment - 48 - Risks and Network Intrusion
    • Segment - 49 - Common Attacks
    • Segment - 50 - Security Recommendations