Computer Networks Security from Scratch to Advanced – Mohammad Adly

7,138.00

Computer Networks Security from Scratch to AdvancedComputer networks security concepts, technologies, devices, and toolsBy the end of this course you will be fully aware of the wired and wireless computer networks basics, devices, and protocols in a step-by-step pace. You will also reach the professional level in networks security in terms of concepts, technologies, and tools. The course requires no background or pre-requisite, yet you will be able to understand all the up-to-date terminologies in the networks security during the lectures.This course is organized as follows:Section One: introduction to Computer NetworksLecture 1: What is a Computer Network?Lecture 2: Computer Networks TopologiesLecture 3: Computer Networks CategoriesLecture 4: Computer Networks Devices and ServicesLecture 5: Computer Networks Transmission MediaSection Two: ISO/OSI Model (7 Layers)Lecture 1: Why ISO/OSI Model?Lecture 2: Application, Presentation, and Session LayersLecture 3: Transport and Network LayersLecture 4: Data Link and Physical LayersLecture 5: ISO/OSI Model in ActionSection Three: TCP/IP Protocol SuiteLecture 1: Introduction to Computer Networks ProtocolsLecture 2: IP ProtocolLecture 3: TCP and UDP ProtocolsLecture 4: Application ProtocolsLecture 5: TCP/IP Characteristics and ToolsSection Four: Wireless NetworksLecture 1: Wireless Networks BenefitsLecture 2: Wireless Networks TypesLecture 3: Wireless Networks Protocol (Wi-Fi)Lecture 4: Wireless Networks DevicesLecture 5: Wireless Networks DrawbacksSection Five: Computer Networks SecurityLecture 1: Security GoalsLecture 2: Securing the Network DesignLecture 3: TCP/IP Security and ToolsLecture 4: Port Scanning and ToolsLecture 5: Sniffing and ToolsSection Six: Firewalls and HoneypotsLecture 1: Why Using a Firewall?Lecture 2: Firewalls RulesLecture 3: Firewalls FilteringLecture 4: Honey PotsLecture 5: Bypassing FirewallsSection Seven: Intrusion Detection and Prevention systems (IDS/IPS)Lecture 1: What is Intrusion Detection Systems (IDS)?Lecture 2: Network IDS (NIDS)Lecture 3: NIDS ChallengesLecture 4: Snort as NIDSLecture 5: Intrusion Prevention Systems (IPS)Section Eight: Wireless Networks SecurityLecture 1: Wired Equivalent Privacy WEP AttackingLecture 2: WPA and AES ProtocolsLecture 3: Wireless Security MisconceptionsLecture 4: Wireless Attacks and MitigationLecture 5: Secure Network Design with WirelessSection Nine: Physical Security & Incident HandlingLecture 1: Physical Security ObjectivesLecture 2: Physical Threats and MitigationLecture 3: Defense in Depth (DiD)Lecture 4: What is an Incident?Lecture 5: Incident HandlingSection Ten: Computer Networks Security ConclusionLecture 1: Confidentiality, Integrity, and Availability (CIA)Lecture 2: Assets, Threats, and VulnerabilitiesLecture 3: Risks and Network IntrusionLecture 4: Common AttacksLecture 5: Security RecommendationsGet Computer Networks Security from Scratch to Advanced – Mohammad Adly, Only Price $47Course CurriculumIntroduction to Computer NetworksIntroduction (9:57)What is a Computer Network? (10:29)Computer Networks Topologies (11:06)Computer Networks Categories (9:47)Computer Networks Devices and Services (10:38)Computer Networks Transmission Media (9:19)ISO/OSI Model (7 Layers)Why ISO/OSI Model? (9:56)Application, Presentation, and Session Layers (11:50)tTransport and Network Layers (10:46)tData Link and Physical Layers (8:32)ISO/OSI Model in Action (10:04)TCP/IP Protocol SuiteIntroduction to Computer Networks Protocols (10:41)IP Protocol (12:53)TCP and UDP Protocols (12:28)Application Protocols (11:36)TCP/IP Characteristics and Tools (10:39)Wireless NetworksWireless Networks Benefits (9:19)Wireless Networks Types (12:14)Wireless Networks Protocol (Wi-Fi) (6:47)Wireless Networks Devices (10:28)Wireless Networks Drawbacks (9:23)Computer Networks SecuritySecurity Goals (8:53)Securing the Network Design (10:07)TCP/IP Security and Tools (11:50)Port Scanning and Tools (11:15)Sniffing and Tools (10:18)Firewalls and HoneypotsWhy Using a Firewall? (12:49)Firewalls Rules (10:31)Firewalls Filtering (8:33)Honeypots (6:42)Bypassing Firewalls (8:00)Intrusion Detection and Prevention systems (IDS/IPS)What is Intrusion Detection Systems (IDS)? (11:16)Network IDS (NIDS) (6:08)NIDS Challenges (8:55)Snort as NIDS (8:20)Intrusion Prevention Systems (IPS) (7:21)Wireless Networks SecurityWired Equivalent Privacy WEP Attacking (10:40)WPA and AES Protocols (8:31)Wireless Security Misconceptions (8:39)Wireless Attacks and Mitigation (9:08)Secure Network Design with Wireless (8:41)Physical Security and Incident HandlingPhysical Security Objectives (10:45)Physical Threats and Mitigation (10:50)Defense in Depth (DiD) (7:18)What is an Incident? (5:40)Incident Handling (13:50)Computer Networks Security ConclusionConfidentiality, Integrity, and Availability (CIA) (6:10)Assets, Threats, and Vulnerabilities (4:10)Risks and Network Intrusion (5:36)Common Attacks (8:46)Security Recommendations (6:18)Get Computer Networks Security from Scratch to Advanced – Mohammad Adly, Only Price $47Tag: Computer Networks Security from Scratch to Advanced – Mohammad Adly  Review. Computer Networks Security from Scratch to Advanced – Mohammad Adly download. Computer Networks Security from Scratch to Advanced – Mohammad Adly discount.