Upon completion of this course, you will possess a comprehensive understanding of the fundamental principles of wired and wireless computer networks, including devices and protocols, delivered in a structured, step-by-step manner.
Additionally, you will attain a high level of proficiency in network security, encompassing concepts, technologies, and tools. This course is designed to accommodate individuals with no prior background or prerequisites, ensuring that you will grasp the latest terminologies in network security throughout the lectures.
The structure of this course is as follows:
Module 1: Networking Fundamentals
- Lecture 1: Introduction to Computer Networks Protocols
- Lecture 2: IP Protocol
- Lecture 3: TCP and UDP Protocols
- Lecture 4: Application Protocols
- Lecture 5: TCP/IP Characteristics and Tools
Module 2: Networking Layers
- Lecture 1: Introduction to OSI Model
- Lecture 2: Transport and Network Layers
- Lecture 3: Data Link and Physical Layers
- Lecture 4: ISO/OSI Model in Action
Module 3: TCP/IP Protocol Suite
- Lecture 1: Overview of TCP/IP Protocol Suite
- Lecture 2: TCP/IP Application Layers
- Lecture 3: TCP/IP Transport Layers
- Lecture 4: TCP/IP Network Layers
- Lecture 5: TCP/IP Link Layers
Module 4: Wireless Networks
- Lecture 1: Understanding Wireless Networks
- Lecture 2: Types of Wireless Networks
- Lecture 3: Wi-Fi Protocol for Wireless Networks
- Lecture 4: Devices in Wireless Networks
- Lecture 5: Drawbacks of Wireless Networks
Module 5: Network Security Fundamentals
- Lecture 1: Introduction to Network Security
- Lecture 2: Securing Network Designs
- Lecture 3: TCP/IP Security and Tools
- Lecture 4: Port Scanning and Tools
- Lecture 5: Sniffing and Tools
Module 6: Firewalls and Honeypots
- Lecture 1: Firewall Fundamentals
- Lecture 2: Implementing Firewall Rules
- Lecture 3: Firewall Filtering Techniques
- Lecture 4: Understanding Honeypots
- Lecture 5: Circumventing Firewalls
Module 7: Intrusion Detection and Prevention Systems
- Lecture 1: Overview of Intrusion Detection Systems (IDS)
- Lecture 2: Network Intrusion Detection Systems (NIDS)
- Lecture 3: Challenges in NIDS
- Lecture 4: NIDS Implementation using Snort
- Lecture 5: Intrusion Prevention Systems (IPS)
Module 8: Wireless Networks Security
- Lecture 1: Vulnerabilities in WEP Protocol
- Lecture 2: WPA and AES Protocols for Wireless Security
- Lecture 3: Common Misconceptions about Wireless Security
- Lecture 4: Attacks on Wireless Networks and Mitigation
- Lecture 5: Securing Networks with Wireless Technology
Module 9: Physical Security & Incident Handling
- Lecture 1: Objectives of Physical Security
- Lecture 2: Identifying and Mitigating Physical Threats
- Lecture 3: Understanding Defense in Depth (DiD)
- Lecture 4: Incident Overview
- Lecture 5: Handling Network Incidents
Module 10: Network Security Conclusion
- Lecture 1: Ensuring Confidentiality, Integrity, and Availability (CIA)
- Lecture 2: Identifying Assets, Threats, and Vulnerabilities
- Lecture 3: Risks and Network Intrusions
- Lecture 4: Common Network Attacks
- Lecture 5: Security Best Practices and Recommendations
- Network administrators
- Cyber security officers
- Computer science undergraduates
- Computer engineering undergraduates
- Network security postgraduates
- Network technical support specialists
- Security incident handlers
- IT Engineers and CEOs
- Software Developers
- Web Developers
- Mobile Applications Developers
- This has been impactful and very interactive ~ D Olakunle
- Short and precise description of each topic, liking it so far ~ Saurabh S
- It was wonderful and good explanation from the lecturer. Moreover, learned new things and magnified my understanding, good job ~ Ndabezinhle
- I'm working on wireless network in a big company, i have learned alot and now with better understanding ~ Caven L
- All basic theory well explain & now I know where to continue to study Network Security. Would recommend to anyone who is just starting out. Tons of good information :) ~ Kenneth T
- Loved the course till now! Fantastic presentation and detailed understanding of each and every point. Thank you very much sir❤️! ~ Vibek
- The explanation of the OSI model is the most lucid and straightforward I've seen. Nice job ~ Philip S
- Thanks so much for your very valuable training. I really enjoyed it, and appreciated that you made it fun! I feel much better prepared to deal with uncomfortable issues. Thank you for your wisdom, experience and personable presentation ~ H Afridi
- The lecture is clear and easy to understand. It is is also comprehensive and it broadened my understanding of networking and security as a system ~ Megersa M
- The course was very interesting about the security related to networking and related devises. This gave me basic foundation about how to handle security issues and be safe in any vulnerable network ~ Shailesh K
- Hey this is Adams. As I want to build a career in Computer Network and Security, this course has increased my knowledge. I understand a lot about how I can protect myself and others from being vulnerable while using any device that can be connected to the internet, the best thing is; when I leaned about nmap command I found out that most of all ports was opened on my network. I closed them which I gained that knowledge from this course, and I appreciate the hard working teacher. He is doing great job and I recommend any student who want to build his/her career in Computer Network and Security to add this course to his wishlist. Thank you ~ Adams M
- This course is great for ones who wants to learn the concept of networking in deep. My experience was amazing. As I have some sort of certification in the field of networking and system administration using RHEL, this course has been an added advantage for me. I learnt lot of new concepts and gained deep knowledge. I would definitely recommend this course to everyone who wants to learn advance concept in the field of network security ~ Shyam V
- Introduction to Computer Networks
- ISO/OSI Model (7 Layers)
- TCP/IP Protocol Suite
- Wireless Networks
- Computer Networks Security
- Firewalls and Honeypots
- Intrusion Detection and Prevention systems (IDS/IPS)
- Wireless Networks Security
- Physical Security & Incident Handling
- Computer Networks Security Recommendations
- Basic computer knowledge
- Basic Internet skills and adequate connection
- Beginner networking background
- Microsoft Windows machine
- Microsoft Power Point for the presentation material
- Beginner cyber security information
- Laptop machine and standard browser