Computer Networks Security
- Offered byCodered
Computer Networks Security at Codered Overview
Duration | 8 hours |
Total fee | ₹5,742 |
Mode of learning | Online |
Credential | Certificate |
Computer Networks Security at Codered Highlights
- Earn a certificate after completion
Computer Networks Security at Codered Course details
- Introduction to Computer Networks
- Understand about ISO/OSI Model (7 Layers)
- Familiarize with TCP/IP Protocol Suite
- Introduction to Wireless Networks
- Gain In-depth Knowledge about Computer Networks Security
- Understand about Firewalls and Honeypots
- Familiarize with Intrusion Detection and Prevention systems (IDS/IPS).
- Introduction to Wireless Networks Security
- Introduction to Physical Security & Incident Handling
- Understand about Computer Networks Security Recommendations
- This course will help learner understand computer security and network security
- During this course, learner will go through various aspects in computer and network security and will be able to understand about different security aspects
- By the end of this course, learner will be fully aware of the wired and wireless computer networks basics, devices, and protocols in a step-by-step pace
- Learner will also reach the professional level in networks security in terms of concepts, technologies, and tools
- The course requires no background or pre-requisite, yet learner will be able to understand all the up-to-date terminologies in the network's security during the lectures
Computer Networks Security at Codered Curriculum
Chapter 1: Introduction to Computer Networks
What is a Computer Network?
Computer Networks Topologies
Computer Networks Categories
Computer Networks Devices and Services
Computer Networks Transmission Media
Chapter 2: ISO/OSI Model (7?Layers)
Why ISO/OSI Model?
Application, Presentation, and Session Layers
Transport and Network Layers
Data Link and Physical Layers
ISO/OSI Model in Action
Chapter 3: TCP/IP Protocol?Suite
Introduction to Computer Networks Protocols
IP Protocol
TCP and UDP Protocols
Application Protocols
TCP/IP Characteristics and Tools
Chapter4: Wireless Networks
Wireless Networks Benefits
Wireless Network Types
Wireless Networks Protocol (Wi-Fi)
Wireless Networks Devices
Wireless Networks Drawbacks
Chapter 5: Computer Networks Security
Security Goals
Securing the Network Design
TCP/IP Security and Tools
Port Scanning and Tools
Sniffing and Tools
Chapter 6: Firewalls and Honeypots
Why Using a Firewall?
Firewalls Rules
Firewalls Filtering
Honeypots
Bypassing Firewalls
Chapter 7: Intrusion Detection and Prevention Systems (IDS/IPS)
What is Intrusion Detection Systems (IDS)?
Network IDS (NIDS)
NIDS Challenges
Snort as NIDS
Intrusion Prevention Systems (IPS)
Chapter 8: Wireless Networks Security
Wired Equivalent Privacy WEP Attacking
WPA and AES Protocols
Wireless Security Misconceptions
Wireless Attacks and Mitigation
Secure Network Design with Wireless
Chapter 9: Physical Security Incident Handling
Physical Security Objectives
Physical Threats and Mitigation
Defence in Depth (DiD)
What is an Incident?
Incident Handling
Chapter 10: Computer Networks Security Conclusion
Confidentiality, Integrity, and Availability (CIA)
Assets, Threats, and Vulnerabilities
Risks and Network Intrusion
Common Attacks
Security Recommendations