[ FreeCourseWeb.com ] Computer Networks Security from Scratch to Advanced
Download More Latest Courses Visit -->> https://FreeCourseWeb.com
Video: .MP4, 1280x720 30 fps | Audio: AAC, 48kHz, 2ch | Duration: 08:04:52 Genre: eLearning | Language: English + Subtitles | Size: 894 MB
Computer Networks Security Technologies and Tools for Network Admins and Cyber Security Officers What you'll learn Introduction to Computer Networks ISO/OSI Model (7 Layers) TCP/IP Protocol Suite Wireless Networks Computer Networks Security Firewalls and Honeypots Intrusion Detection and Prevention systems (IDS/IPS) Wireless Networks Security Physical Security & Incident Handling
Computer Networks Security Recommendations
Requirements Basic computer knowledge Basic Internet skills and adequate connection Beginner networking background Microsoft Windows machine Microsoft Power Point for the presentation material Beginner cyber security information Laptop machine and standard browser Description By the end of this course you will be fully aware of the wired and wireless computer networks basics, devices, and protocols in a step-by-step pace. You will also reach the professional level in networks security in terms of concepts, technologies, and tools. The course requires no background or pre-requisite, yet you will be able to understand all the up-to-date terminologies in the networks security during the lectures. This course is organized as follows: Section One: introduction to Computer Networks Lecture 1: What is a Computer Network?Lecture 2: Computer Networks TopologiesLecture 3: Computer Networks CategoriesLecture 4: Computer Networks Devices and ServicesLecture 5: Computer Networks Transmission Media Section Two: ISO/OSI Model (7 Layers) Lecture 1: Why ISO/OSI Model?Lecture 2: Application, Presentation, and Session LayersLecture 3: Transport and Network LayersLecture 4: Data Link and Physical LayersLecture 5: ISO/OSI Model in Action Section Three: TCP/IP Protocol Suite Lecture 1: Introduction to Computer Networks ProtocolsLecture 2: IP ProtocolLecture 3: TCP and UDP ProtocolsLecture 4: Application ProtocolsLecture 5: TCP/IP Characteristics and Tools Section Four: Wireless Networks Lecture 1: Wireless Networks BenefitsLecture 2: Wireless Networks TypesLecture 3: Wireless Networks Protocol (Wi-Fi)Lecture 4: Wireless Networks DevicesLecture 5: Wireless Networks Drawbacks Section Five: Computer Networks Security Lecture 1: Security GoalsLecture 2: Securing the Network DesignLecture 3: TCP/IP Security and ToolsLecture 4: Port Scanning and ToolsLecture 5: Sniffing and Tools Section Six: Firewalls and Honeypots Lecture 1: Why Using a Firewall?Lecture 2: Firewalls RulesLecture 3: Firewalls FilteringLecture 4: Honey PotsLecture 5: Bypassing Firewalls Section Seven: Intrusion Detection and Prevention systems (IDS/IPS) Lecture 1: What is Intrusion Detection Systems (IDS)?Lecture 2: Network IDS (NIDS)Lecture 3: NIDS ChallengesLecture 4: Snort as NIDSLecture 5: Intrusion Prevention Systems (IPS) Section Eight: Wireless Networks Security Lecture 1: Wired Equivalent Privacy WEP AttackingLecture 2: WPA and AES ProtocolsLecture 3: Wireless Security MisconceptionsLecture 4: Wireless Attacks and MitigationLecture 5: Secure Network Design with Wireless Section Nine: Physical Security & Incident Handling Lecture 1: Physical Security ObjectivesLecture 2: Physical Threats and MitigationLecture 3: Defense in Depth (DiD)Lecture 4: What is an Incident?Lecture 5: Incident Handling Section Ten: Computer Networks Security Conclusion Lecture 1: Confidentiality, Integrity, and Availability (CIA)Lecture 2: Assets, Threats, and VulnerabilitiesLecture 3: Risks and Network IntrusionLecture 4: Common AttacksLecture 5: Security Recommendations Who this course is for: Network administrators Cyber security officers Computer science undergraduates Computer engineering undergraduates Network security postgraduates Network technical support specialists Security incident handlers IT Engineers and CEOs Software Developers Web Developers Mobile Applications Developers
Use Winrar to Extract. And use a shorter path when extracting, such as C: drive
ALSO ANOTHER TIP: You Can Easily Navigate Using Winrar and Rename the Too Long File/ Folder Name if Needed While You Cannot in Default Windows Explorer. You are Welcome ! :)
Download More Latest Courses Visit -->> https://FreeCourseWeb.com
Get Latest Apps Tips and Tricks -->> https://AppWikia.com
We upload these learning materials for the people from all over the world, who have the talent and motivation to sharpen their skills/ knowledge but do not have the financial support to afford the materials. If you like this content and if you are truly in a position that you can actually buy the materials, then Please, we repeat, Please, Support Authors. They Deserve it! Because always remember, without "Them", you and we won't be here having this conversation. Think about it! Peace...
|
udp://opentor.org:2710/announce udp://p4p.arenabg.com:1337/announce udp://tracker.torrent.eu.org:451/announce udp://tracker.cyberia.is:6969/announce udp://9.rarbg.to:2710/announc udp://explodie.org:6969/announce udp://tracker.moeking.me:6969/announce udp://tracker.opentrackr.org:1337/announce udp://tracker.tiny-vps.com:6969/announce udp://ipv4.tracker.harry.lu:80/announce udp://tracker.coppersurfer.tk:6969/announce udp://tracker.leechers-paradise.org:6969/announce udp://open.stealth.si:80/announce udp://tracker.pirateparty.gr:6969/announce udp://inferno.demonoid.is:3391/announce |