This course provides a thorough introduction to the principles and practices of computer network security. Participants will learn about key security concepts, including network threats, vulnerabilities, and defense mechanisms. Topics covered include firewall configuration, intrusion detection systems, encryption, and secure network protocols. The course also addresses best practices for protecting data and maintaining network integrity. Designed for IT professionals, security analysts, and anyone interested in safeguarding digital assets, the course combines theoretical knowledge with practical applications and real-world scenarios. By the end, learners will be equipped with the skills needed to design, implement, and manage secure network environments effectively.
Who is this course for?
By taking this Computer Network Security course, you’re able to open yourself to new opportunities within the cybersecurity and network security career path. Such careers may include:
- Network Security Engineer (£35,000 to £65,000)
- IT Security Specialist (£30,000 to £55,000)
- Cybersecurity Consultant (£40,000 to £70,000)
Course Curriculum
| Introduction | |||
| Introduction | 00:10:00 | ||
| Section 01: An Introduction to Computer Networks | |||
| 1.1 Computer Network | 00:11:00 | ||
| 1.2 Computer Network Topologies | 00:11:00 | ||
| 1.3 Categories of Computer Network | 00:10:00 | ||
| 1.4 Computer Network Devices | 00:11:00 | ||
| 1.5 Transmission Media | 00:09:00 | ||
| Section 02: ISO/OSI Model | |||
| 2.1 ISO/OSI Model | 00:10:00 | ||
| 2.2 Application, Presentation, and Session Layers | 00:12:00 | ||
| 2.3 Transport and Network Layers | 00:11:00 | ||
| 2.4 Data Link and Physical Layers | 00:09:00 | ||
| 2.5 ISO/OSI Model in Action | 00:10:00 | ||
| Section 03: TCP/IP Protocols | |||
| 3.1 Introduction to Computer Networks Protocols | 00:11:00 | ||
| 3.2 IP Protocol | 00:13:00 | ||
| 3.3 TCP and UDP Protocols | 00:12:00 | ||
| 3.4 Application Protocols | 00:12:00 | ||
| 3.5 TCP/IP Characteristics and Tools | 00:11:00 | ||
| Section 04: Wireless Networks | |||
| 4.1 Wireless Networks Benefits | 00:09:00 | ||
| 4.2 Types of Wireless Networks | 00:12:00 | ||
| 4.3 Wireless Networks Protocol (Wi-Fi) | 00:07:00 | ||
| 4.4 Wireless Networks Devices | 00:10:00 | ||
| 4.5 Wireless Networks Drawbacks | 00:09:00 | ||
| Section 05: Network Security | |||
| 5.1 Security Goals | 00:09:00 | ||
| 5.2 Securing the Network Design | 00:10:00 | ||
| 5.3 TCP/IP Security and Tools | 00:12:00 | ||
| 5.4 Port Scanning and Tools | 00:11:00 | ||
| 5.5 Sniffing and Tools | 00:10:00 | ||
| Section 06: Firewalls and Honeypots | |||
| 6.1 Reasons to Use Firewall | 00:13:00 | ||
| 6.2 Firewalls Rules | 00:11:00 | ||
| 6.3 Firewalls Filtering | 00:09:00 | ||
| 6.4 Honeypots | 00:07:00 | ||
| 6.5 Bypassing Firewalls | 00:08:00 | ||
| Section 07: Intrusion Detection and Prevention System | |||
| 7.1 Intrusion Detection System: IDS | 00:11:00 | ||
| 7.2 Network IDS: NIDS | 00:06:00 | ||
| 7.3 NIDS Challenges | 00:09:00 | ||
| 7.4 Snort as NIDS | 00:08:00 | ||
| 7.5 Intrusion Prevention Systems: IPS | 00:07:00 | ||
| Section 08: Wireless Network Security | |||
| 8.1 Wired Equivalent Privacy WEP Attacking | 00:11:00 | ||
| 8.2 WPA and AES Protocols | 00:09:00 | ||
| 8.3 Wireless Security Misconceptions | 00:09:00 | ||
| 8.4 Wireless Attacks and Mitigation | 00:09:00 | ||
| 8.5 Secure Network Design with Wireless | 00:09:00 | ||
| Section 09: Physical Security and Incident Handling | |||
| 9.1 Physical Security Objectives | 00:11:00 | ||
| 9.2 Physical Threats and Mitigation | 00:11:00 | ||
| 9.3 Defense in Depth (DiD) | 00:07:00 | ||
| 9.4 Incident | 00:06:00 | ||
| 9.5 Incident Handling | 00:14:00 | ||
| Section 10: Network Security: Conclusion | |||
| 10.1 Confidentiality, Integrity, and Availability (CIA) | 00:06:00 | ||
| 10.2 Assets, Threats, and Vulnerabilities | 00:04:00 | ||
| 10.3 Risks and Network Intrusion | 00:06:00 | ||
| 10.4 Common Attacks | 00:09:00 | ||
| 10.5 Security Recommendations | 00:06:00 | ||


