Computer Networks Security from Scratch to Advanced
This is a subtitle. Get more detailed about your course here!
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed at ante vitae nulla vulputate elementum. Maecenas imperdiet malesuada lacinia. Donec sit amet aliquet urna. Nam sit amet eros dapibus, commodo ligula a, imperdiet mi. Fusce rhoncus eros in leo rutrum, at lobortis leo sodales. Quisque nibh tellus, rutrum placerat turpis ac, ullamcorper suscipit nisl. Nullam faucibus quam a leo imperdiet, vel blandit nibh iaculis. Duis efficitur ipsum eu eros fermentum, in volutpat erat tincidunt. Curabitur sit amet vulputate sem. Donec vel facilisis est. Morbi vitae mollis massa, sed maximus ex. Duis elit orci, scelerisque ut erat eu, tincidunt euismod erat.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed at ante vitae nulla vulputate elementum. Maecenas imperdiet malesuada lacinia. Donec sit amet aliquet urna. Nam sit amet eros dapibus, commodo ligula a, imperdiet mi. Fusce rhoncus eros in leo rutrum, at lobortis leo sodales. Quisque nibh tellus, rutrum placerat turpis ac, ullamcorper suscipit nisl. Nullam faucibus quam a leo imperdiet, vel blandit nibh iaculis. Duis efficitur ipsum eu eros fermentum, in volutpat erat tincidunt. Curabitur sit amet vulputate sem. Donec vel facilisis est. Morbi vitae mollis massa, sed maximus ex. Duis elit orci, scelerisque ut erat eu, tincidunt euismod erat.
Introduction
What is a Computer Network?
Computer Networks Topologies
Computer Networks Categories
Computer Networks Devices and Services
Computer Networks Transmission Media
Quiz on Section One
Why ISO/OSI Model?
Application, Presentation, and Session Layers
Transport and Network Layers
Data Link and Physical Layers
ISO/OSI Model in Action
Quiz on Section Two
Introduction to Computer Networks Protocols
IP Protocol
TCP and UDP Protocols
Application Protocols
TCP/IP Characteristics and Tools
Quiz on Section Three
Wireless Networks Benefits
Wireless Networks Types
Wireless Networks Protocol (Wi-Fi)
Wireless Networks Devices
Wireless Networks Drawbacks
Quiz on Section Four
Security Goals
Securing the Network Design
TCP/IP Security and Tools
Port Scanning and Tools
Sniffing and Tools
Quiz on Section Five
Why Using a Firewall?
Firewalls Rules
Firewalls Filtering
Honeypots
Bypassing Firewalls
Quiz on Section Six
What is Intrusion Detection Systems (IDS)?
Network IDS (NIDS)
NIDS Challenges
Snort as NIDS
Intrusion Prevention Systems (IPS)
Quiz on Section Seven
Wired Equivalent Privacy WEP Attacking
WPA and AES Protocols
Wireless Security Misconceptions
Wireless Attacks and Mitigation
Secure Network Design with Wireless
Quiz on Section Eight
Physical Security Objectives
Physical Threats and Mitigation
Defense in Depth (DiD)
What is an Incident?
Incident Handling
Quiz on Section Nine
Confidentiality, Integrity, and Availability (CIA)
Assets, Threats, and Vulnerabilities
Risks and Network Intrusion
Common Attacks
Security Recommendations
Quiz on Section Ten
Final Exam
Bheeej Paguirigan