Setup Menus in Admin Panel

  • LOGIN
  • No products in the cart.

Course Name: Computer Networks Security from Scratch to Advanced

Descriptions

Course Curriculum

Section 1: Introduction to Computer Networks
Introduction 00:00:00
What is a Computer Network 00:00:00
Computer Networks Topologies 00:00:00
Computer Networks Categories 00:00:00
Computer Networks Devices and Services 00:00:00
Computer Networks Transmission Media 00:00:00
Section 2: ISO / OSI Model (7 Layers)
Why ISO / OSI Model 00:00:00
Application, Presentation, and Session Layers 00:00:00
Transport and Network Layers 00:00:00
Data Link and Physical Layers 00:00:00
ISO / OSI Model in Action 00:00:00
Section 3: TCP / IP Protocol Suite
Introduction to Computer Networks Protocols 00:00:00
IP Protocol 00:00:00
TCP and UDP Protocols 00:00:00
Application Protocols 00:00:00
TCP / IP Characteristics and Tools 00:00:00
Section 4: Wireless Networks
Wireless Networks Benefits 00:00:00
Wireless Networks Types 00:00:00
Wireless Networks Protocol (Wi-Fi) 00:00:00
Wireless Networks Devices 00:00:00
Wireless Networks Drawbacks 00:00:00
Section 5: Computer Networks Security
Security Goals 00:00:00
Securing the Network Design 00:00:00
TCP / IP Security and Tools 00:00:00
Port Scanning and Tools 00:00:00
Sniffing and Tools 00:00:00
Section 6: Firewalls and Honeypots
Why Using a Firewall 00:00:00
Firewalls Rules 00:00:00
Firewalls Filtering 00:00:00
Honeypots 00:00:00
Bypassing Firewalls 00:00:00
Section 7: Intrusion Detection and Prevention Systems (IDS/IPS)
What is Intrusion Detection Systems (IDS) 00:00:00
Network IDS (NIDS) 00:00:00
NIDS Challenges 00:00:00
Snort as NIDS 00:00:00
Intrusion Prevention Systems (IPS) 00:00:00
Section 8: Wireless Networks Security
Wired Equivalent Privacy WEP Attacking 00:00:00
WPA and AES Protocols 00:00:00
Wireless Security Misconceptions 00:00:00
Wireless Attacks and Mitigation 00:00:00
Secure Network Design with Wireless 00:00:00
Section 9: Physical Security and Incident Handling
Physical Security Objectives 00:00:00
Physical Threats and Mitigation 00:00:00
Defense in Depth (DiD) 00:00:00
What is an Incident 00:00:00
Incident Handling 00:00:00
Section 10: Computer Networks Security Conclusion
Confidentiality, Integrity, and Availability (CIA) 00:00:00
Assets, Threats, and Vulnerabilities 00:00:00
Risks and Network Intrusion 00:00:00
Common Attacks 00:00:00
Security Recommendations 00:00:00
Online Learning Thailand.
X