Computer Networks Security from Scratch to Advanced

Computer Networks Security Technologies and Tools for Network Admins and Cyber Security Officers

Last updated 5/2023 English

* Please use the WELCOME-20 Discount Code to enjoy 20% Off

Get your team access to top Uplyrn courses anytime, anywhere.


By the end of this course you will be fully aware of the wired and wireless computer networks basics, devices, and protocols in a step-by-step pace. You will also reach the professional level in networks security in terms of concepts, technologies, and tools. The course requires no background or pre-requisite, yet you will be able to understand all the up-to-date terminologies in the networks security during the lectures.

This course is organized as follows:

Section One: Introduction to Computer Networks

  • Lecture 1: What is a Computer Network?
  • Lecture 2: Computer Networks Topologies
  • Lecture 3: Computer Networks Categories
  • Lecture 4: Computer Networks Devices and Services
  • Lecture 5: Computer Networks Transmission Media

Section Two: ISO/OSI Model (7 Layers)

  • Lecture 1: Why ISO/OSI Model?
  • Lecture 2: Application, Presentation, and Session Layers
  • Lecture 3: Transport and Network Layers
  • Lecture 4: Data Link and Physical Layers
  • Lecture 5: ISO/OSI Model in Action

Section Three: TCP/IP Protocol Suite

  • Lecture 1: Introduction to Computer Networks Protocols
  • Lecture 2: IP Protocol
  • Lecture 3: TCP and UDP Protocols
  • Lecture 4: Application Protocols
  • Lecture 5: TCP/IP Characteristics and Tools

Section Four: Wireless Networks

  • Lecture 1: Wireless Networks Benefits
  • Lecture 2: Wireless Networks Types
  • Lecture 3: Wireless Networks Protocol (Wi-Fi)
  • Lecture 4: Wireless Networks Devices
  • Lecture 5: Wireless Networks Drawbacks

Section Five: Computer Networks Security

  • Lecture 1: Security Goals
  • Lecture 2: Securing the Network Design
  • Lecture 3: TCP/IP Security and Tools
  • Lecture 4: Port Scanning and Tools
  • Lecture 5: Sniffing and Tools

Section Six: Firewalls and Honeypots

  • Lecture 1: Why Using a Firewall?
  • Lecture 2: Firewalls Rules
  • Lecture 3: Firewalls Filtering
  • Lecture 4: Honey Pots
  • Lecture 5: Bypassing Firewalls

Section Seven: Intrusion Detection and Prevention Systems (IDS/IPS)

  • Lecture 1: What is Intrusion Detection Systems (IDS)?
  • Lecture 2: Network IDS (NIDS)
  • Lecture 3: NIDS Challenges
  • Lecture 4: Snort as NIDS
  • Lecture 5: Intrusion Prevention Systems (IPS)

Section Eight: Wireless Networks Security

  • Lecture 1: Wired Equivalent Privacy WEP Attacking
  • Lecture 2: WPA and AES Protocols
  • Lecture 3: Wireless Security Misconceptions
  • Lecture 4: Wireless Attacks and Mitigation
  • Lecture 5: Secure Network Design with Wireless

Section Nine: Physical Security & Incident Handling

  • Lecture 1: Physical Security Objectives
  • Lecture 2: Physical Threats and Mitigation
  • Lecture 3: Defense in Depth (DiD)
  • Lecture 4: What is an Incident?
  • Lecture 5: Incident Handling

Section Ten: Computer Networks Security Conclusion

  • Lecture 1: Confidentiality, Integrity, and Availability (CIA)
  • Lecture 2: Assets, Threats, and Vulnerabilities
  • Lecture 3: Risks and Network Intrusion
  • Lecture 4: Common Attacks
  • Lecture 5: Security Recommendations

Who this course is for

  1. Network administrators
  2. Cyber security officers
  3. Computer science undergraduates
  4. Computer engineering undergraduates
  5. Network security postgraduates
  6. Network technical support specialists
  7. Security incident handlers
  8. IT Engineers and CEOs
  9. Software Developers
  10. Web Developers
  11. Mobile Applications Developers


  1. This has been impactful and very interactive ~ D Olakunle 
  2. Short and precise description of each topic, liking it so far ~ Saurabh S
  3. It was wonderful and good explanation from the lecturer. Moreover, learned new things and magnified my understanding, good job ~ Ndabezinhle
  4. I'm working on wireless network in a big company, i have learned alot and now with better understanding ~ Caven L
  5. All basic theory well explain & now I know where to continue to study Network Security. Would recommend to anyone who is just starting out. Tons of good information :) ~ Kenneth T
  6. Loved the course till now! Fantastic presentation and detailed understanding of each and every point. Thank you very much sir❤️! ~ Vibek
  7. The explanation of the OSI model is the most lucid and straightforward I've seen. Nice job ~ Philip S
  8. Thanks so much for your very valuable training. I really enjoyed it, and appreciated that you made it fun! I feel much better prepared to deal with uncomfortable issues. Thank you for your wisdom, experience and personable presentation ~ H Afridi
  9. The lecture is clear and easy to understand. It is is also comprehensive and it broadened my understanding of networking and security as a system ~ Megersa M
  10. The course was very interesting about the security related to networking and related devises. This gave me basic foundation about how to handle security issues and be safe in any vulnerable network ~ Shailesh K
  11. Hey this is Adams. As I want to build a career in Computer Network and Security, this course has increased my knowledge. I understand a lot about how I can protect myself and others from being vulnerable while using any device that can be connected to the internet, the best thing is; when I leaned about nmap command I found out that most of all ports was opened on my network. I closed them which I gained that knowledge from this course, and I appreciate the hard working teacher. He is doing great job and I recommend any student who want to build his/her career in Computer Network and Security to add this course to his wishlist. Thank you ~ Adams M
  12. This course is great for ones who wants to learn the concept of networking in deep. My experience was amazing. As I have some sort of certification in the field of networking and system administration using RHEL, this course has been an added advantage for me. I learnt lot of new concepts and gained deep knowledge. I would definitely recommend this course to everyone who wants to learn advance concept in the field of network security ~ Shyam V

What you'll learn

  1. Introduction to Computer Networks
  2. ISO/OSI Model (7 Layers)
  3. TCP/IP Protocol Suite
  4. Wireless Networks
  5. Computer Networks Security
  6. Firewalls and Honeypots
  7. Intrusion Detection and Prevention systems (IDS/IPS)
  8. Wireless Networks Security
  9. Physical Security & Incident Handling
  10. Computer Networks Security Recommendations


  1. Basic computer knowledge
  2. Basic Internet skills and adequate connection
  3. Beginner networking background
  4. Microsoft Windows machine
  5. Microsoft Power Point for the presentation material
  6. Beginner cyber security information
  7. Laptop machine and standard browser

Course Content

10 Sections 51 Lectures 8h 5m total length

We work with trusted partners to collaborate, engage and connect with you.