Computer Networks: How You Can Secure Your Network
Gain expertise in wired & wireless networks, protocols & security concepts from scratch to advanced level. Learn the latest terminologies & best practices.
184
views
Last updated
5/2024
English
Or
* Please use the WELCOME-20 Discount Codeto enjoy 20% Off
Get your team access to top Uplyrn courses anytime,
anywhere.
Overview
Upon completion of this course, you will possess a comprehensive understanding of the fundamental principles of wired and wireless computer networks, including devices and protocols, delivered in a structured, step-by-step manner.
Additionally, you will attain a high level of proficiency in network security, encompassing concepts, technologies, and tools. This course is designed to accommodate individuals with no prior background or prerequisites, ensuring that you will grasp the latest terminologies in network security throughout the lectures.
The structure of this course is as follows:
Module 1: Networking Fundamentals
Lecture 1: Introduction to Computer Networks Protocols
Lecture 2: IP Protocol
Lecture 3: TCP and UDP Protocols
Lecture 4: Application Protocols
Lecture 5: TCP/IP Characteristics and Tools
Module 2: Networking Layers
Lecture 1: Introduction to OSI Model
Lecture 2: Transport and Network Layers
Lecture 3: Data Link and Physical Layers
Lecture 4: ISO/OSI Model in Action
Module 3: TCP/IP Protocol Suite
Lecture 1: Overview of TCP/IP Protocol Suite
Lecture 2: TCP/IP Application Layers
Lecture 3: TCP/IP Transport Layers
Lecture 4: TCP/IP Network Layers
Lecture 5: TCP/IP Link Layers
Module 4: Wireless Networks
Lecture 1: Understanding Wireless Networks
Lecture 2: Types of Wireless Networks
Lecture 3: Wi-Fi Protocol for Wireless Networks
Lecture 4: Devices in Wireless Networks
Lecture 5: Drawbacks of Wireless Networks
Module 5: Network Security Fundamentals
Lecture 1: Introduction to Network Security
Lecture 2: Securing Network Designs
Lecture 3: TCP/IP Security and Tools
Lecture 4: Port Scanning and Tools
Lecture 5: Sniffing and Tools
Module 6: Firewalls and Honeypots
Lecture 1: Firewall Fundamentals
Lecture 2: Implementing Firewall Rules
Lecture 3: Firewall Filtering Techniques
Lecture 4: Understanding Honeypots
Lecture 5: Circumventing Firewalls
Module 7: Intrusion Detection and Prevention Systems
Lecture 1: Overview of Intrusion Detection Systems (IDS)
Lecture 2: Network Intrusion Detection Systems (NIDS)
Lecture 3: Challenges in NIDS
Lecture 4: NIDS Implementation using Snort
Lecture 5: Intrusion Prevention Systems (IPS)
Module 8: Wireless Networks Security
Lecture 1: Vulnerabilities in WEP Protocol
Lecture 2: WPA and AES Protocols for Wireless Security
Lecture 3: Common Misconceptions about Wireless Security
Lecture 4: Attacks on Wireless Networks and Mitigation
Lecture 5: Securing Networks with Wireless Technology
Module 9: Physical Security & Incident Handling
Lecture 1: Objectives of Physical Security
Lecture 2: Identifying and Mitigating Physical Threats
Lecture 3: Understanding Defense in Depth (DiD)
Lecture 4: Incident Overview
Lecture 5: Handling Network Incidents
Module 10: Network Security Conclusion
Lecture 1: Ensuring Confidentiality, Integrity, and Availability (CIA)
Lecture 2: Identifying Assets, Threats, and Vulnerabilities
Lecture 3: Risks and Network Intrusions
Lecture 4: Common Network Attacks
Lecture 5: Security Best Practices and Recommendations
Who this course is for
Network administrators
Cyber security officers
Computer science undergraduates
Computer engineering undergraduates
Network security postgraduates
Network technical support specialists
Security incident handlers
IT Engineers and CEOs
Software Developers
Web Developers
Mobile Applications Developers
Testimonials
This has been impactful and very interactive ~ D Olakunle
Short and precise description of each topic, liking it so far ~ Saurabh S
It was wonderful and good explanation from the lecturer. Moreover, learned new things and magnified my understanding, good job ~ Ndabezinhle
I'm working on wireless network in a big company, i have learned alot and now with better understanding ~ Caven L
All basic theory well explain & now I know where to continue to study Network Security. Would recommend to anyone who is just starting out. Tons of good information :) ~ Kenneth T
Loved the course till now! Fantastic presentation and detailed understanding of each and every point. Thank you very much sir❤️! ~ Vibek
The explanation of the OSI model is the most lucid and straightforward I've seen. Nice job ~ Philip S
Thanks so much for your very valuable training. I really enjoyed it, and appreciated that you made it fun! I feel much better prepared to deal with uncomfortable issues. Thank you for your wisdom, experience and personable presentation ~ H Afridi
The lecture is clear and easy to understand. It is is also comprehensive and it broadened my understanding of networking and security as a system ~ Megersa M
The course was very interesting about the security related to networking and related devises. This gave me basic foundation about how to handle security issues and be safe in any vulnerable network ~ Shailesh K
Hey this is Adams. As I want to build a career in Computer Network and Security, this course has increased my knowledge. I understand a lot about how I can protect myself and others from being vulnerable while using any device that can be connected to the internet, the best thing is; when I leaned about nmap command I found out that most of all ports was opened on my network. I closed them which I gained that knowledge from this course, and I appreciate the hard working teacher. He is doing great job and I recommend any student who want to build his/her career in Computer Network and Security to add this course to his wishlist. Thank you ~ Adams M
This course is great for ones who wants to learn the concept of networking in deep. My experience was amazing. As I have some sort of certification in the field of networking and system administration using RHEL, this course has been an added advantage for me. I learnt lot of new concepts and gained deep knowledge. I would definitely recommend this course to everyone who wants to learn advance concept in the field of network security ~ Shyam V
What you'll learn
Introduction to Computer Networks
ISO/OSI Model (7 Layers)
TCP/IP Protocol Suite
Wireless Networks
Computer Networks Security
Firewalls and Honeypots
Intrusion Detection and Prevention systems (IDS/IPS)
Wireless Networks Security
Physical Security & Incident Handling
Computer Networks Security Recommendations
Requirements
Basic computer knowledge
Basic Internet skills and adequate connection
Beginner networking background
Microsoft Windows machine
Microsoft Power Point for the presentation material
Overview
Upon completion of this course, you will possess a comprehensive understanding of the fundamental principles of wired and wireless computer networks, including devices and protocols, delivered in a structured, step-by-step manner.
Additionally, you will attain a high level of proficiency in network security, encompassing concepts, technologies, and tools. This course is designed to accommodate individuals with no prior background or prerequisites, ensuring that you will grasp the latest terminologies in network security throughout the lectures.
The structure of this course is as follows:
Module 1: Networking Fundamentals
Module 2: Networking Layers
Module 3: TCP/IP Protocol Suite
Module 4: Wireless Networks
Module 5: Network Security Fundamentals
Module 6: Firewalls and Honeypots
Module 7: Intrusion Detection and Prevention Systems
Module 8: Wireless Networks Security
Module 9: Physical Security & Incident Handling
Module 10: Network Security Conclusion
Who this course is for
Testimonials
What you'll learn
Requirements
Course Content
10 Sections 51 Lectures 8h 5m total length
All Comments