What Will I Learn? Introduction to Computer Networks TCP/IP Protocol Suite Computer Networks Security Intrusion Detection and Prevention systems (IDS/IPS) …
Intrusion Detection and Prevention systems (IDS/IPS)
Physical Security & Incident Handling
ISO/OSI Model (7 Layers)
Wireless Networks
Wireless Networks Security
Course Overview
The comprehensive Computer Network Security has been designed by industry experts to provide learners with everything they need to enhance their skills and knowledge in their chosen area of study. Enrol on the Computer Network Security today, and learn from the very best the industry has to offer!
This best selling Computer Network Security has been developed by industry professionals and has already been completed by hundreds of satisfied students. This in-depth Computer Network Security is suitable for anyone who wants to build their professional skill set and improve their expert knowledge.
The Computer Network Security is CPD-accredited, so you can be confident you’re completing a quality training course which will boost your CV and enhance your career potential. The Computer Network Security is made up of several information-packed modules which break down each topic into bite-sized chunks to ensure you understand and retain everything you learn.
After successfully completing the Computer Network Security, you will be awarded a certificate of completion as proof of your new skills. If you are looking to pursue a new career and want to build your professional skills to excel in your chosen field, the certificate of completion from the Computer Network Security will help you stand out from the crowd. You can also validate your certification on our website.
We know that you are busy and that time is precious, so we have designed the Computer Network Security to be completed at your own pace, whether that’s part-time or full-time. Get full course access upon registration and access the course materials from anywhere in the world, at any time, from any internet-enabled device.
Our experienced tutors are here to support you through the entire learning process and answer any queries you may have via email.
Preview
Certification
After successfully completing the course, you will be able to get the UK and internationally accepted certificate to share your achievement with potential employers or include it in your CV. The PDF Certificate + Transcript is available at £6.99 (Special Offer - 50% OFF). In addition, you can get a hard copy of your certificate for £12 (Shipping cost inside the UK is free, and outside the UK is £9.99).
Course Curriculum
Introduction
Introduction
00:10:00
Section 01: An Introduction to Computer Networks
1.1 Computer Network
00:11:00
1.2 Computer Network Topologies
00:11:00
1.3 Categories of Computer Network
00:10:00
1.4 Computer Network Devices
00:11:00
1.5 Transmission Media
00:09:00
Section 02: ISO/OSI Model
2.1 ISO/OSI Model
00:10:00
2.2 Application, Presentation, and Session Layers
00:12:00
2.3 Transport and Network Layers
00:11:00
2.4 Data Link and Physical Layers
00:09:00
2.5 ISO/OSI Model in Action
00:10:00
Section 03: TCP/IP Protocols
3.1 Introduction to Computer Networks Protocols
00:11:00
3.2 IP Protocol
00:13:00
3.3 TCP and UDP Protocols
00:12:00
3.4 Application Protocols
00:12:00
3.5 TCP/IP Characteristics and Tools
00:11:00
Section 04: Wireless Networks
4.1 Wireless Networks Benefits
00:09:00
4.2 Types of Wireless Networks
00:12:00
4.3 Wireless Networks Protocol (Wi-Fi)
00:07:00
4.4 Wireless Networks Devices
00:10:00
4.5 Wireless Networks Drawbacks
00:09:00
Section 05: Network Security
5.1 Security Goals
00:09:00
5.2 Securing the Network Design
00:10:00
5.3 TCP/IP Security and Tools
00:12:00
5.4 Port Scanning and Tools
00:11:00
5.5 Sniffing and Tools
00:10:00
Section 06: Firewalls and Honeypots
6.1 Reasons to Use Firewall
00:13:00
6.2 Firewalls Rules
00:11:00
6.3 Firewalls Filtering
00:09:00
6.4 Honeypots
00:07:00
6.5 Bypassing Firewalls
00:08:00
Section 07: Intrusion Detection and Prevention System
7.1 Intrusion Detection System: IDS
00:11:00
7.2 Network IDS: NIDS
00:06:00
7.3 NIDS Challenges
00:09:00
7.4 Snort as NIDS
00:08:00
7.5 Intrusion Prevention Systems: IPS
00:07:00
Section 08: Wireless Network Security
8.1 Wired Equivalent Privacy WEP Attacking
00:11:00
8.2 WPA and AES Protocols
00:09:00
8.3 Wireless Security Misconceptions
00:09:00
8.4 Wireless Attacks and Mitigation
00:09:00
8.5 Secure Network Design with Wireless
00:09:00
Section 09: Physical Security and Incident Handling
9.1 Physical Security Objectives
00:11:00
9.2 Physical Threats and Mitigation
00:11:00
9.3 Defense in Depth (DiD)
00:07:00
9.4 Incident
00:06:00
9.5 Incident Handling
00:14:00
Section 10: Network Security: Conclusion
10.1 Confidentiality, Integrity, and Availability (CIA)
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.