Booking options
ยฃ25
ยฃ25
On-Demand course
8 hours 8 minutes
All levels
Gain the solid skills and knowledge to kickstart a successful career and learn from the experts with this step-by-step Advanced Computer Networks Security training course. This Advanced Computer Networks Security course for Consistent Profits has been specially designed to help learners gain a good command of Advanced Computer Networks Security, providing them with a solid foundation of knowledge to understand relevant professionals' job roles.
Through this Advanced Computer Networks Security course, you will gain a theoretical understanding of Advanced Computer Networks Security Course and others relevant subjects that will increase your employability in this field, help you stand out from the competition, and boost your earning potential in no time.
Not only that, but this Advanced Computer Networks Security training includes up-to-date knowledge and techniques that will ensure you have the most in-demand skills to rise to the top of the industry.
This course is fully CPD-accredited and broken down into several manageable modules, making it ideal for aspiring professionals.
Familiar yourself with the recent development and updates of the relevant industry
Know how to use your theoretical knowledge to adapt in any working environment
Get help from our expert tutors anytime you need
Access to course contents that are designed and prepared by industry professionals
Study at your convenient time and from wherever you want
Affordable premium-quality E-learning content, you can learn at your own pace.
You will receive a completion certificate upon completing the course.
Internationally recognized Accredited Qualification will boost up your resume.
You will learn the researched and proven approach adopted by successful people to transform their careers.
You will be able to incorporate various techniques successfully and understand your customers better.
No formal qualifications required, anyone from any academic background can take this course.
Access to a computer or digital device with internet connectivity.
Introduction | |||
โถ | Introduction | ๐ 00:10:00 | |
Section 01: An Introduction to Computer Networks | |||
โถ | 1.1 Computer Network | ๐ 00:11:00 | |
โถ | 1.2 Computer Network Topologies | ๐ 00:11:00 | |
โถ | 1.3 Categories of Computer Network | ๐ 00:10:00 | |
โถ | 1.4 Computer Network Devices | ๐ 00:11:00 | |
โถ | 1.5 Transmission Media | ๐ 00:09:00 | |
Section 02: ISO/OSI Model | |||
โถ | 2.1 ISO/OSI Model | ๐ 00:10:00 | |
โถ | 2.2 Application, Presentation, and Session Layers | ๐ 00:12:00 | |
โถ | 2.3 Transport and Network Layers | ๐ 00:11:00 | |
โถ | 2.4 Data Link and Physical Layers | ๐ 00:09:00 | |
โถ | 2.5 ISO/OSI Model in Action | ๐ 00:10:00 | |
Section 03: TCP/IP Protocols | |||
โถ | 3.1 Introduction to Computer Networks Protocols | ๐ 00:11:00 | |
โถ | 3.2 IP Protocol | ๐ 00:13:00 | |
โถ | 3.3 TCP and UDP Protocols | ๐ 00:12:00 | |
โถ | 3.4 Application Protocols | ๐ 00:12:00 | |
โถ | 3.5 TCP/IP Characteristics and Tools | ๐ 00:11:00 | |
Section 04: Wireless Networks | |||
โถ | 4.1 Wireless Networks Benefits | ๐ 00:09:00 | |
โถ | 4.2 Types of Wireless Networks | ๐ 00:12:00 | |
โถ | 4.3 Wireless Networks Protocol (Wi-Fi) | ๐ 00:07:00 | |
โถ | 4.4 Wireless Networks Devices | ๐ 00:10:00 | |
โถ | 4.5 Wireless Networks Drawbacks | ๐ 00:09:00 | |
Section 05: Network Security | |||
โถ | 5.1 Security Goals | ๐ 00:09:00 | |
โถ | 5.2 Securing the Network Design | ๐ 00:10:00 | |
โถ | 5.3 TCP/IP Security and Tools | ๐ 00:12:00 | |
โถ | 5.4 Port Scanning and Tools | ๐ 00:11:00 | |
โถ | 5.5 Sniffing and Tools | ๐ 00:10:00 | |
Section 06: Firewalls and Honeypots | |||
โถ | 6.1 Reasons to Use Firewall | ๐ 00:13:00 | |
โถ | 6.2 Firewalls Rules | ๐ 00:11:00 | |
โถ | 6.3 Firewalls Filtering | ๐ 00:09:00 | |
โถ | 6.4 Honeypots | ๐ 00:07:00 | |
โถ | 6.5 Bypassing Firewalls | ๐ 00:08:00 | |
Section 07: Intrusion Detection and Prevention System | |||
โถ | 7.1 Intrusion Detection System: IDS | ๐ 00:11:00 | |
โถ | 7.2 Network IDS: NIDS | ๐ 00:06:00 | |
โถ | 7.3 NIDS Challenges | ๐ 00:09:00 | |
โถ | 7.4 Snort as NIDS | ๐ 00:08:00 | |
โถ | 7.5 Intrusion Prevention Systems: IPS | ๐ 00:07:00 | |
Section 08: Wireless Network Security | |||
โถ | 8.1 Wired Equivalent Privacy WEP Attacking | ๐ 00:11:00 | |
โถ | 8.2 WPA and AES Protocols | ๐ 00:09:00 | |
โถ | 8.3 Wireless Security Misconceptions | ๐ 00:09:00 | |
โถ | 8.4 Wireless Attacks and Mitigation | ๐ 00:09:00 | |
โถ | 8.5 Secure Network Design with Wireless | ๐ 00:09:00 | |
Section 09: Physical Security and Incident Handling | |||
โถ | 9.1 Physical Security Objectives | ๐ 00:11:00 | |
โถ | 9.2 Physical Threats and Mitigation | ๐ 00:11:00 | |
โถ | 9.3 Defense in Depth (DiD) | ๐ 00:07:00 | |
โถ | 9.4 Incident | ๐ 00:06:00 | |
โถ | 9.5 Incident Handling | ๐ 00:14:00 | |
Section 10: Network Security: Conclusion | |||
โถ | 10.1 Confidentiality, Integrity, and Availability (CIA) | ๐ 00:06:00 | |
โถ | 10.2 Assets, Threats, and Vulnerabilities | ๐ 00:04:00 | |
โถ | 10.3 Risks and Network Intrusion | ๐ 00:06:00 | |
โถ | 10.4 Common Attacks | ๐ 00:09:00 | |
โถ | 10.5 Security Recommendations | ๐ 00:06:00 |
Skill Up presents a rigorous online education experience, helping you obtain industry-relevant skills certified by the worldโs...