Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed at ante vitae nulla vulputate elementum. Maecenas imperdiet malesuada lacinia. Donec sit amet aliquet urna. Nam sit amet eros dapibus, commodo ligula a, imperdiet mi. Fusce rhoncus eros in leo rutrum, at lobortis leo sodales. Quisque nibh tellus, rutrum placerat turpis ac, ullamcorper suscipit nisl. Nullam faucibus quam a leo imperdiet, vel blandit nibh iaculis. Duis efficitur ipsum eu eros fermentum, in volutpat erat tincidunt. Curabitur sit amet vulputate sem. Donec vel facilisis est. Morbi vitae mollis massa, sed maximus ex. Duis elit orci, scelerisque ut erat eu, tincidunt euismod erat.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed at ante vitae nulla vulputate elementum. Maecenas imperdiet malesuada lacinia. Donec sit amet aliquet urna. Nam sit amet eros dapibus, commodo ligula a, imperdiet mi. Fusce rhoncus eros in leo rutrum, at lobortis leo sodales. Quisque nibh tellus, rutrum placerat turpis ac, ullamcorper suscipit nisl. Nullam faucibus quam a leo imperdiet, vel blandit nibh iaculis. Duis efficitur ipsum eu eros fermentum, in volutpat erat tincidunt. Curabitur sit amet vulputate sem. Donec vel facilisis est. Morbi vitae mollis massa, sed maximus ex. Duis elit orci, scelerisque ut erat eu, tincidunt euismod erat.

Course Curriculum

  • 1

    Introduction to Computer Networks

    • Introduction

    • What is a Computer Network?

    • Computer Networks Topologies

    • Computer Networks Categories

    • Computer Networks Devices and Services

    • Computer Networks Transmission Media

    • Quiz on Section One

  • 2

    ISO/OSI Model (7 Layers)

    • Why ISO/OSI Model?

    • Application, Presentation, and Session Layers

    • Transport and Network Layers

    • Data Link and Physical Layers

    • ISO/OSI Model in Action

    • Quiz on Section Two

  • 3

    TCP/IP Protocol Suite

    • Introduction to Computer Networks Protocols

    • IP Protocol

    • TCP and UDP Protocols

    • Application Protocols

    • TCP/IP Characteristics and Tools

    • Quiz on Section Three

  • 4

    Wireless Networks

    • Wireless Networks Benefits

    • Wireless Networks Types

    • Wireless Networks Protocol (Wi-Fi)

    • Wireless Networks Devices

    • Wireless Networks Drawbacks

    • Quiz on Section Four

  • 5

    Computer Networks Security

    • Security Goals

    • Securing the Network Design

    • TCP/IP Security and Tools

    • Port Scanning and Tools

    • Sniffing and Tools

    • Quiz on Section Five

  • 6

    Firewalls and Honeypots

    • Why Using a Firewall?

    • Firewalls Rules

    • Firewalls Filtering

    • Honeypots

    • Bypassing Firewalls

    • Quiz on Section Six

  • 7

    Intrusion Detection and Prevention Systems (IDS/IPS)

    • What is Intrusion Detection Systems (IDS)?

    • Network IDS (NIDS)

    • NIDS Challenges

    • Snort as NIDS

    • Intrusion Prevention Systems (IPS)

    • Quiz on Section Seven

  • 8

    Wireless Networks Security

    • Wired Equivalent Privacy WEP Attacking

    • WPA and AES Protocols

    • Wireless Security Misconceptions

    • Wireless Attacks and Mitigation

    • Secure Network Design with Wireless

    • Quiz on Section Eight

  • 9

    Physical Security and Incident Handling

    • Physical Security Objectives

    • Physical Threats and Mitigation

    • Defense in Depth (DiD)

    • What is an Incident?

    • Incident Handling

    • Quiz on Section Nine

  • 10

    Computer Networks Security Conclusion

    • Confidentiality, Integrity, and Availability (CIA)

    • Assets, Threats, and Vulnerabilities

    • Risks and Network Intrusion

    • Common Attacks

    • Security Recommendations

    • Quiz on Section Ten

    • Final Exam

About the instructor

Bheeej Paguirigan

What others have been saying about this course:

Use your Call To Action description to encourage students to sign up for your course

You may also be interested in...