Get your team access to top Uplyrn courses anytime, anywhere.
Overview
By the end of this course you will be fully aware of the wired and wireless computer networks basics, devices, and protocols in a step-by-step pace. You will also reach the professional level in networks security in terms of concepts, technologies, and tools. The course requires no background or pre-requisite, yet you will be able to understand all the up-to-date terminologies in the networks security during the lectures.
This course is organized as follows:
Section One: Introduction to Computer Networks
Lecture 1: What is a Computer Network?
Lecture 2: Computer Networks Topologies
Lecture 3: Computer Networks Categories
Lecture 4: Computer Networks Devices and Services
Lecture 5: Computer Networks Transmission Media
Section Two: ISO/OSI Model (7 Layers)
Lecture 1: Why ISO/OSI Model?
Lecture 2: Application, Presentation, and Session Layers
Lecture 3: Transport and Network Layers
Lecture 4: Data Link and Physical Layers
Lecture 5: ISO/OSI Model in Action
Section Three: TCP/IP Protocol Suite
Lecture 1: Introduction to Computer Networks Protocols
Lecture 2: IP Protocol
Lecture 3: TCP and UDP Protocols
Lecture 4: Application Protocols
Lecture 5: TCP/IP Characteristics and Tools
Section Four: Wireless Networks
Lecture 1: Wireless Networks Benefits
Lecture 2: Wireless Networks Types
Lecture 3: Wireless Networks Protocol (Wi-Fi)
Lecture 4: Wireless Networks Devices
Lecture 5: Wireless Networks Drawbacks
Section Five: Computer Networks Security
Lecture 1: Security Goals
Lecture 2: Securing the Network Design
Lecture 3: TCP/IP Security and Tools
Lecture 4: Port Scanning and Tools
Lecture 5: Sniffing and Tools
Section Six: Firewalls and Honeypots
Lecture 1: Why Using a Firewall?
Lecture 2: Firewalls Rules
Lecture 3: Firewalls Filtering
Lecture 4: Honey Pots
Lecture 5: Bypassing Firewalls
Section Seven: Intrusion Detection and Prevention Systems (IDS/IPS)
Lecture 1: What is Intrusion Detection Systems (IDS)?
Lecture 1: Confidentiality, Integrity, and Availability (CIA)
Lecture 2: Assets, Threats, and Vulnerabilities
Lecture 3: Risks and Network Intrusion
Lecture 4: Common Attacks
Lecture 5: Security Recommendations
Who this course is for
Network administrators
Cyber security officers
Computer science undergraduates
Computer engineering undergraduates
Network security postgraduates
Network technical support specialists
Security incident handlers
IT Engineers and CEOs
Software Developers
Web Developers
Mobile Applications Developers
Testimonials
This has been impactful and very interactive ~ D Olakunle
Short and precise description of each topic, liking it so far ~ Saurabh S
It was wonderful and good explanation from the lecturer. Moreover, learned new things and magnified my understanding, good job ~ Ndabezinhle
I'm working on wireless network in a big company, i have learned alot and now with better understanding ~ Caven L
All basic theory well explain & now I know where to continue to study Network Security. Would recommend to anyone who is just starting out. Tons of good information :) ~ Kenneth T
Loved the course till now! Fantastic presentation and detailed understanding of each and every point. Thank you very much sir❤️! ~ Vibek
The explanation of the OSI model is the most lucid and straightforward I've seen. Nice job ~ Philip S
Thanks so much for your very valuable training. I really enjoyed it, and appreciated that you made it fun! I feel much better prepared to deal with uncomfortable issues. Thank you for your wisdom, experience and personable presentation ~ H Afridi
The lecture is clear and easy to understand. It is is also comprehensive and it broadened my understanding of networking and security as a system ~ Megersa M
The course was very interesting about the security related to networking and related devises. This gave me basic foundation about how to handle security issues and be safe in any vulnerable network ~ Shailesh K
Hey this is Adams. As I want to build a career in Computer Network and Security, this course has increased my knowledge. I understand a lot about how I can protect myself and others from being vulnerable while using any device that can be connected to the internet, the best thing is; when I leaned about nmap command I found out that most of all ports was opened on my network. I closed them which I gained that knowledge from this course, and I appreciate the hard working teacher. He is doing great job and I recommend any student who want to build his/her career in Computer Network and Security to add this course to his wishlist. Thank you ~ Adams M
This course is great for ones who wants to learn the concept of networking in deep. My experience was amazing. As I have some sort of certification in the field of networking and system administration using RHEL, this course has been an added advantage for me. I learnt lot of new concepts and gained deep knowledge. I would definitely recommend this course to everyone who wants to learn advance concept in the field of network security ~ Shyam V
What you'll learn
Introduction to Computer Networks
ISO/OSI Model (7 Layers)
TCP/IP Protocol Suite
Wireless Networks
Computer Networks Security
Firewalls and Honeypots
Intrusion Detection and Prevention systems (IDS/IPS)
Wireless Networks Security
Physical Security & Incident Handling
Computer Networks Security Recommendations
Requirements
Basic computer knowledge
Basic Internet skills and adequate connection
Beginner networking background
Microsoft Windows machine
Microsoft Power Point for the presentation material
Overview
By the end of this course you will be fully aware of the wired and wireless computer networks basics, devices, and protocols in a step-by-step pace. You will also reach the professional level in networks security in terms of concepts, technologies, and tools. The course requires no background or pre-requisite, yet you will be able to understand all the up-to-date terminologies in the networks security during the lectures.
This course is organized as follows:
Section One: Introduction to Computer Networks
Section Two: ISO/OSI Model (7 Layers)
Section Three: TCP/IP Protocol Suite
Section Four: Wireless Networks
Section Five: Computer Networks Security
Section Six: Firewalls and Honeypots
Section Seven: Intrusion Detection and Prevention Systems (IDS/IPS)
Section Eight: Wireless Networks Security
Section Nine: Physical Security & Incident Handling
Section Ten: Computer Networks Security Conclusion
Who this course is for
Testimonials
What you'll learn
Requirements
Course Content
10 Sections 51 Lectures 8h 5m total length
All Comments