Subtotal: 7,136.18

View cartCheckout

This course provides a thorough introduction to the principles and practices of computer network security. Participants will learn about key security concepts, including network threats, vulnerabilities, and defense mechanisms. Topics covered include firewall configuration, intrusion detection systems, encryption, and secure network protocols. The course also addresses best practices for protecting data and maintaining network integrity. Designed for IT professionals, security analysts, and anyone interested in safeguarding digital assets, the course combines theoretical knowledge with practical applications and real-world scenarios. By the end, learners will be equipped with the skills needed to design, implement, and manage secure network environments effectively.

Who is this course for?

By taking this Computer Network Security course, you’re able to open yourself to new opportunities within the cybersecurity and network security career path. Such careers may include:

  • Network Security Engineer (£35,000 to £65,000)
  • IT Security Specialist (£30,000 to £55,000)
  • Cybersecurity Consultant (£40,000 to £70,000)

Course Curriculum

Introduction
Introduction 00:10:00
Section 01: An Introduction to Computer Networks
1.1 Computer Network 00:11:00
1.2 Computer Network Topologies 00:11:00
1.3 Categories of Computer Network 00:10:00
1.4 Computer Network Devices 00:11:00
1.5 Transmission Media 00:09:00
Section 02: ISO/OSI Model
2.1 ISO/OSI Model 00:10:00
2.2 Application, Presentation, and Session Layers 00:12:00
2.3 Transport and Network Layers 00:11:00
2.4 Data Link and Physical Layers 00:09:00
2.5 ISO/OSI Model in Action 00:10:00
Section 03: TCP/IP Protocols
3.1 Introduction to Computer Networks Protocols 00:11:00
3.2 IP Protocol 00:13:00
3.3 TCP and UDP Protocols 00:12:00
3.4 Application Protocols 00:12:00
3.5 TCP/IP Characteristics and Tools 00:11:00
Section 04: Wireless Networks
4.1 Wireless Networks Benefits 00:09:00
4.2 Types of Wireless Networks 00:12:00
4.3 Wireless Networks Protocol (Wi-Fi) 00:07:00
4.4 Wireless Networks Devices 00:10:00
4.5 Wireless Networks Drawbacks 00:09:00
Section 05: Network Security
5.1 Security Goals 00:09:00
5.2 Securing the Network Design 00:10:00
5.3 TCP/IP Security and Tools 00:12:00
5.4 Port Scanning and Tools 00:11:00
5.5 Sniffing and Tools 00:10:00
Section 06: Firewalls and Honeypots
6.1 Reasons to Use Firewall 00:13:00
6.2 Firewalls Rules 00:11:00
6.3 Firewalls Filtering 00:09:00
6.4 Honeypots 00:07:00
6.5 Bypassing Firewalls 00:08:00
Section 07: Intrusion Detection and Prevention System
7.1 Intrusion Detection System: IDS 00:11:00
7.2 Network IDS: NIDS 00:06:00
7.3 NIDS Challenges 00:09:00
7.4 Snort as NIDS 00:08:00
7.5 Intrusion Prevention Systems: IPS 00:07:00
Section 08: Wireless Network Security
8.1 Wired Equivalent Privacy WEP Attacking 00:11:00
8.2 WPA and AES Protocols 00:09:00
8.3 Wireless Security Misconceptions 00:09:00
8.4 Wireless Attacks and Mitigation 00:09:00
8.5 Secure Network Design with Wireless 00:09:00
Section 09: Physical Security and Incident Handling
9.1 Physical Security Objectives 00:11:00
9.2 Physical Threats and Mitigation 00:11:00
9.3 Defense in Depth (DiD) 00:07:00
9.4 Incident 00:06:00
9.5 Incident Handling 00:14:00
Section 10: Network Security: Conclusion
10.1 Confidentiality, Integrity, and Availability (CIA) 00:06:00
10.2 Assets, Threats, and Vulnerabilities 00:04:00
10.3 Risks and Network Intrusion 00:06:00
10.4 Common Attacks 00:09:00
10.5 Security Recommendations 00:06:00
TAKE THIS COURSE
167 STUDENTS ENROLLED

    ADM SoftTech

    Deka Group
    Dubai and London

    Address:

    2nd Floor, College House, 17 King Edwards Road
    Ruislip, London
    HA47AE, United Kingdom

    Other “Deka Group” Companies:

    www.admarkets.co.uk
    www.admtours.com

    Contact Us

    support@admsoft.co.uk

    Select your currency
    INR Indian rupee