Booking options
£12
£12
On-Demand course
8 hours 8 minutes
All levels
This comprehensive course on Computer Networks Security will deepen your understanding on this topic.
After successful completion of this course you can acquire the required skills in this sector. This Computer Networks Security comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market.
So enrol in this course today to fast track your career ladder.
You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate.
There is no experience or previous qualifications required for enrolment on this Computer Networks Security. It is available to all students, of all academic backgrounds.
Our Computer Networks Security is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G.
There is no time limit for completing this course, it can be studied in your own time at your own pace.
Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to-
Open doors of opportunities
Increase your adaptability
Keep you relevant
Boost confidence
And much more!
12 sections • 52 lectures • 08:08:00 total length
•Introduction: 00:10:00
•1.1 Computer Network: 00:11:00
•1.2 Computer Network Topologies: 00:11:00
•1.3 Categories of Computer Network: 00:10:00
•1.4 Computer Network Devices: 00:11:00
•1.5 Transmission Media: 00:09:00
•2.1 ISO/OSI Model: 00:10:00
•2.2 Application, Presentation, and Session Layers: 00:12:00
•2.3 Transport and Network Layers: 00:11:00
•2.4 Data Link and Physical Layers: 00:09:00
•2.5 ISO/OSI Model in Action: 00:10:00
•3.1 Introduction to Computer Networks Protocols: 00:11:00
•3.2 IP Protocol: 00:13:00
•3.3 TCP and UDP Protocols: 00:12:00
•3.4 Application Protocols: 00:12:00
•3.5 TCP/IP Characteristics and Tools: 00:11:00
•4.1 Wireless Networks Benefits: 00:09:00
•4.2 Types of Wireless Networks: 00:12:00
•4.3 Wireless Networks Protocol (Wi-Fi): 00:07:00
•4.4 Wireless Networks Devices: 00:10:00
•4.5 Wireless Networks Drawbacks: 00:09:00
•5.1 Security Goals: 00:09:00
•5.2 Securing the Network Design: 00:10:00
•5.3 TCP/IP Security and Tools: 00:12:00
•5.4 Port Scanning and Tools: 00:11:00
•5.5 Sniffing and Tools: 00:10:00
•6.1 Reasons to Use Firewall: 00:13:00
•6.2 Firewalls Rules: 00:11:00
•6.3 Firewalls Filtering: 00:09:00
•6.4 Honeypots: 00:07:00
•6.5 Bypassing Firewalls: 00:08:00
•7.1 Intrusion Detection System: IDS: 00:11:00
•7.2 Network IDS: NIDS: 00:06:00
•7.3 NIDS Challenges: 00:09:00
•7.4 Snort as NIDS: 00:08:00
•7.5 Intrusion Prevention Systems: IPS: 00:07:00
•8.1 Wired Equivalent Privacy WEP Attacking: 00:11:00
•8.2 WPA and AES Protocols: 00:09:00
•8.3 Wireless Security Misconceptions: 00:09:00
•8.4 Wireless Attacks and Mitigation: 00:09:00
•8.5 Secure Network Design with Wireless: 00:09:00
•9.1 Physical Security Objectives: 00:11:00
•9.2 Physical Threats and Mitigation: 00:11:00
•9.3 Defense in Depth (DiD): 00:07:00
•9.4 Incident: 00:06:00
•9.5 Incident Handling: 00:14:00
•10.1 Confidentiality, Integrity, and Availability (CIA): 00:06:00
•10.2 Assets, Threats, and Vulnerabilities: 00:04:00
•10.3 Risks and Network Intrusion: 00:06:00
•10.4 Common Attacks: 00:09:00
•10.5 Security Recommendations: 00:06:00
•Assignment - Computer Networks Security: 00:00:00
At Apex Learning, we share the goal of millions of people to mak...