Exclusive Deal! 94% Off, Today Only!
Buy 1 or more contact sale
Course Overview
Learn how to make a genuine difference in your life by taking our popular Computer Networks Security from Scratch to Advanced. Our commitment to online learning and our technical experience has been put to excellent use within the content of these educational modules. By enrolling today, you can take your knowledge of Computer Networks Security from Scratch to Advanced to a whole new level and quickly reap the rewards of your study in the field you have chosen.
We are confident that you will find the skills and information that you will need to succeed in this area and excel in the eyes of others. Do not rely on substandard training or half-hearted education. Commit to the best, and we will help you reach your full potential whenever and wherever you need us.
Please note that Computer Networks Security from Scratch to Advanced provides valuable and significant theoretical training for all. However, it does not offer official qualifications for professional practice. Always check details with the appropriate authorities or management.
Learning Outcomes
Your Path to Success
By completing the training in Computer Networks Security from Scratch to Advanced, you will be able to significantly demonstrate your acquired abilities and knowledge of Computer Networks Security from Scratch to Advanced. This can give you an advantage in career progression, job applications, and personal mastery in this area.
Is This Course Right for You?
This course is designed to provide an introduction to Computer Networks Security from Scratch to Advanced and offers an excellent way to gain the vital skills and confidence to start a successful career. It also provides access to proven educational knowledge about the subject and will support those wanting to attain personal goals in this area. Full-time and part-time learners are equally supported, and the study periods are entirely customisable to your needs.
Assessment Process
Once you have completed all the modules in Computer Networks Security from Scratch to Advanced course, you can assess your skills and knowledge with an optional assignment. Our expert trainers will assess your assignment and give you feedback afterwards.
Show off Your New Skills with a Certification of Completion
The learners have to successfully complete the assessment of this Computer Networks Security from Scratch to Advanced course to achieve the CPD accredited certificate. Digital certificates can be ordered for only £10. Learners can purchase printed hard copies inside the UK for £29, and international students can purchase printed hard copies for £39.
Introduction | |||
Introduction | 00:10:00 | ||
Section 01: An Introduction to Computer Networks | |||
1.1 Computer Network | 00:11:00 | ||
1.2 Computer Network Topologies | 00:11:00 | ||
1.3 Categories of Computer Network | 00:10:00 | ||
1.4 Computer Network Devices | 00:11:00 | ||
1.5 Transmission Media | 00:09:00 | ||
Section 02: ISO/OSI Model | |||
2.1 ISO/OSI Model | 00:10:00 | ||
2.2 Application, Presentation, and Session Layers | 00:12:00 | ||
2.3 Transport and Network Layers | 00:11:00 | ||
2.4 Data Link and Physical Layers | 00:09:00 | ||
2.5 ISO/OSI Model in Action | 00:10:00 | ||
Section 03: TCP/IP Protocols | |||
3.1 Introduction to Computer Networks Protocols | 00:11:00 | ||
3.2 IP Protocol | 00:13:00 | ||
3.3 TCP and UDP Protocols | 00:12:00 | ||
3.4 Application Protocols | 00:12:00 | ||
3.5 TCP/IP Characteristics and Tools | 00:11:00 | ||
Section 04: Wireless Networks | |||
4.1 Wireless Networks Benefits | 00:09:00 | ||
4.2 Types of Wireless Networks | 00:12:00 | ||
4.3 Wireless Networks Protocol (Wi-Fi) | 00:07:00 | ||
4.4 Wireless Networks Devices | 00:10:00 | ||
4.5 Wireless Networks Drawbacks | 00:09:00 | ||
Section 05: Network Security | |||
5.1 Security Goals | 00:09:00 | ||
5.2 Securing the Network Design | 00:10:00 | ||
5.3 TCP/IP Security and Tools | 00:12:00 | ||
5.4 Port Scanning and Tools | 00:11:00 | ||
5.5 Sniffing and Tools | 00:10:00 | ||
Section 06: Firewalls and Honeypots | |||
6.1 Reasons to Use Firewall | 00:13:00 | ||
6.2 Firewalls Rules | 00:11:00 | ||
6.3 Firewalls Filtering | 00:09:00 | ||
6.4 Honeypots | 00:07:00 | ||
6.5 Bypassing Firewalls | 00:08:00 | ||
Section 07: Intrusion Detection and Prevention System | |||
7.1 Intrusion Detection System: IDS | 00:11:00 | ||
7.2 Network IDS: NIDS | 00:06:00 | ||
7.3 NIDS Challenges | 00:09:00 | ||
7.4 Snort as NIDS | 00:08:00 | ||
7.5 Intrusion Prevention Systems: IPS | 00:07:00 | ||
Section 08: Wireless Network Security | |||
8.1 Wired Equivalent Privacy WEP Attacking | 00:11:00 | ||
8.2 WPA and AES Protocols | 00:09:00 | ||
8.3 Wireless Security Misconceptions | 00:09:00 | ||
8.4 Wireless Attacks and Mitigation | 00:09:00 | ||
8.5 Secure Network Design with Wireless | 00:09:00 | ||
Section 09: Physical Security and Incident Handling | |||
9.1 Physical Security Objectives | 00:11:00 | ||
9.2 Physical Threats and Mitigation | 00:11:00 | ||
9.3 Defense in Depth (DiD) | 00:07:00 | ||
9.4 Incident | 00:06:00 | ||
9.5 Incident Handling | 00:14:00 | ||
Section 10: Network Security: Conclusion | |||
10.1 Confidentiality, Integrity, and Availability (CIA) | 00:06:00 | ||
10.2 Assets, Threats, and Vulnerabilities | 00:04:00 | ||
10.3 Risks and Network Intrusion | 00:06:00 | ||
10.4 Common Attacks | 00:09:00 | ||
10.5 Security Recommendations | 00:06:00 | ||
Assignment | |||
Assignment -Computer Networks Security from Scratch to Advanced | 00:00:00 |
1358
4.9
£799
848
4.9
£799
694
4.9
£799