Booking options
£10.99
£10.99
On-Demand course
8 hours 8 minutes
Intermediate level
Join our Computer Networks Security course and discover your hidden skills, setting you on a path to success in this area. Get ready to improve your skills and achieve your biggest goals. The Computer Networks Security course has everything you need to get a great start in this sector.
Improving and moving forward is key to getting ahead personally. The Computer Networks Security course is designed to teach you the important stuff quickly and well, helping you to get off to a great start in the field. So, what are you looking for? Enrol now!
Learn strategies to boost your workplace efficiency.
Hone your skills to help you advance your career.
Acquire a comprehensive understanding of various topics and tips.
Learn in-demand skills that are in high demand among UK employers
This course covers the topic you must know to stand against the tough competition. The future is truly yours to seize with this Computer Networks Security. Enrol today and complete the course to achieve a certificate that can change your career forever.
One-To-One Support from a Dedicated Tutor Throughout Your Course.
Study Online - Whenever and Wherever You Want.
Instant Digital/ PDF Certificate.
100% Money Back Guarantee.
12 Months Access.
After studying the course, an MCQ exam or assignment will test your skills and knowledge. You have to get a score of 60% to pass the test and get your certificate.
Certificate of Completion - Digital / PDF Certificate
After completing the Computer Networks Security course, you can order your CPD Accredited Digital / PDF Certificate for £5.99.
Certificate of Completion - Hard copy Certificate
You can get the CPD Accredited Hard Copy Certificate for £12.99.
Shipping Charges:
Inside the UK: £3.99
International: £10.99
This Computer Networks Security is suitable for anyone aspiring to start a career in relevant field; even if you are new to this and have no prior knowledge, this course is going to be very easy for you to understand.
On the other hand, if you are already working in this sector, this course will be a great source of knowledge for you to improve your existing skills and take them to the next level.
This course has been developed with maximum flexibility and accessibility, making it ideal for people who don't have the time to devote to traditional education.
You don't need any educational qualification or experience to enrol in the Computer Networks Security course.
Do note: you must be at least 16 years old to enrol.
Any internet-connected device, such as a computer, tablet, or smartphone, can access this online course.
The certification and skills you get from this Computer Networks Security Course can help you advance your career and gain expertise in several fields, allowing you to apply for high-paying jobs in related sectors.
Introduction | ||
Introduction | 00:10:00 | |
Section 01: An Introduction to Computer Networks | ||
1.1 Computer Network | 00:11:00 | |
1.2 Computer Network Topologies | 00:11:00 | |
1.3 Categories of Computer Network | 00:10:00 | |
1.4 Computer Network Devices | 00:11:00 | |
1.5 Transmission Media | 00:09:00 | |
Section 02: ISO/OSI Model | ||
2.1 ISO/OSI Model | 00:10:00 | |
2.2 Application, Presentation, and Session Layers | 00:12:00 | |
2.3 Transport and Network Layers | 00:11:00 | |
2.4 Data Link and Physical Layers | 00:09:00 | |
2.5 ISO/OSI Model in Action | 00:10:00 | |
Section 03: TCP/IP Protocols | ||
3.1 Introduction to Computer Networks Protocols | 00:11:00 | |
3.2 IP Protocol | 00:13:00 | |
3.3 TCP and UDP Protocols | 00:12:00 | |
3.4 Application Protocols | 00:12:00 | |
3.5 TCP/IP Characteristics and Tools | 00:11:00 | |
Section 04: Wireless Networks | ||
4.1 Wireless Networks Benefits | 00:09:00 | |
4.2 Types of Wireless Networks | 00:12:00 | |
4.3 Wireless Networks Protocol (Wi-Fi) | 00:07:00 | |
4.4 Wireless Networks Devices | 00:10:00 | |
4.5 Wireless Networks Drawbacks | 00:09:00 | |
Section 05: Network Security | ||
5.1 Security Goals | 00:09:00 | |
5.2 Securing the Network Design | 00:10:00 | |
5.3 TCP/IP Security and Tools | 00:12:00 | |
5.4 Port Scanning and Tools | 00:11:00 | |
5.5 Sniffing and Tools | 00:10:00 | |
Section 06: Firewalls and Honeypots | ||
6.1 Reasons to Use Firewall | 00:13:00 | |
6.2 Firewalls Rules | 00:11:00 | |
6.3 Firewalls Filtering | 00:09:00 | |
6.4 Honeypots | 00:07:00 | |
6.5 Bypassing Firewalls | 00:08:00 | |
Section 07: Intrusion Detection and Prevention System | ||
7.1 Intrusion Detection System: IDS | 00:11:00 | |
7.2 Network IDS: NIDS | 00:06:00 | |
7.3 NIDS Challenges | 00:09:00 | |
7.4 Snort as NIDS | 00:08:00 | |
7.5 Intrusion Prevention Systems: IPS | 00:07:00 | |
Section 08: Wireless Network Security | ||
8.1 Wired Equivalent Privacy WEP Attacking | 00:11:00 | |
8.2 WPA and AES Protocols | 00:09:00 | |
8.3 Wireless Security Misconceptions | 00:09:00 | |
8.4 Wireless Attacks and Mitigation | 00:09:00 | |
8.5 Secure Network Design with Wireless | 00:09:00 | |
Section 09: Physical Security and Incident Handling | ||
9.1 Physical Security Objectives | 00:11:00 | |
9.2 Physical Threats and Mitigation | 00:11:00 | |
9.3 Defense in Depth (DiD) | 00:07:00 | |
9.4 Incident | 00:06:00 | |
9.5 Incident Handling | 00:14:00 | |
Section 10: Network Security: Conclusion | ||
10.1 Confidentiality, Integrity, and Availability (CIA) | 00:06:00 | |
10.2 Assets, Threats, and Vulnerabilities | 00:04:00 | |
10.3 Risks and Network Intrusion | 00:06:00 | |
10.4 Common Attacks | 00:09:00 | |
10.5 Security Recommendations | 00:06:00 |