Booking options
£10.99
£10.99
On-Demand course
8 hours 8 minutes
All levels
In a world where our lives are increasingly online, network security is more important than ever. This Computer Network Security from Scratch to Advanced course will teach you everything you need to know about computer network security, from the basics of how networks work to the most advanced security technologies.
In this course, you will learn about the ISO/OSI model and TCP/IP protocols, gaining a solid foundation in understanding how data is transmitted across networks. You will then explore wireless networks, learning about their vulnerabilities and how to secure them effectively.
Our expert instructors will guide you through the complex world of network security, covering essential concepts such as firewalls, intrusion detection and prevention systems, and incident handling. Overall, You will develop practical skills in securing computer networks.
By the end of this course, you will have the confidence and knowledge to safeguard networks against potential threats. This will make you an invaluable asset to any organisation. So don't miss out on this opportunity to enhance your coding prowess and become a master in computer network security. Enrol today and unlock a world of exciting possibilities!
Learning Outcomes:
Upon successful completion of the Computer Network Security course, you will be able to:
Understand the fundamentals of computer networks and their components.
Gain in-depth knowledge of the ISO/OSI model and TCP/IP protocols.
Identify and mitigate security vulnerabilities in wireless networks.
Implement effective network security measures, including firewalls and honeypots.
Utilise intrusion detection and prevention systems to safeguard networks.
Develop expertise in securing wireless networks against unauthorised access.
Acquire skills in physical security and incident handling for network protection.
Apply comprehensive network security strategies to ensure data integrity and confidentiality.
Who is this course for?
This Computer Network Security course is ideal for:
IT professionals seeking to enhance their knowledge of network security.
Students pursuing a career in cybersecurity or network administration.
Software developers interested in understanding the intricacies of computer networks.
Network engineers aiming to specialise in network security.
Individuals responsible for maintaining the security of organisational networks.
Career Path
Our Computer Network Security course will prepare you for a range of careers, including:
Network Security Analyst: £35,000 - £60,000 per year.
Cybersecurity Specialist: £45,000 - £80,000 per year.
Network Administrator: £30,000 - £50,000 per year.
IT Security Consultant: £40,000 - £80,000 per year.
Information Security Manager: £50,000 - £100,000 per year.
Network Security Engineer: £40,000 - £70,000 per year.
After studying the course materials of the Computer Networks Security from Scratch to Advanced there will be a written assignment test which you can take either during or at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £5.99. Original Hard Copy certificates need to be ordered at an additional cost of £9.60.
This Computer Networks Security from Scratch to Advanced does not require you to have any prior qualifications or experience. You can just enrol and start learning.This Computer Networks Security from Scratch to Advanced was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection.
Introduction | |||
Introduction | 00:10:00 | ||
Section 01: An Introduction to Computer Networks | |||
1.1 Computer Network | 00:11:00 | ||
1.2 Computer Network Topologies | 00:11:00 | ||
1.3 Categories of Computer Network | 00:10:00 | ||
1.4 Computer Network Devices | 00:11:00 | ||
1.5 Transmission Media | 00:09:00 | ||
Section 02: ISO/OSI Model | |||
2.1 ISO/OSI Model | 00:10:00 | ||
2.2 Application, Presentation, and Session Layers | 00:12:00 | ||
2.3 Transport and Network Layers | 00:11:00 | ||
2.4 Data Link and Physical Layers | 00:09:00 | ||
2.5 ISO/OSI Model in Action | 00:10:00 | ||
Section 03: TCP/IP Protocols | |||
3.1 Introduction to Computer Networks Protocols | 00:11:00 | ||
3.2 IP Protocol | 00:13:00 | ||
3.3 TCP and UDP Protocols | 00:12:00 | ||
3.4 Application Protocols | 00:12:00 | ||
3.5 TCP/IP Characteristics and Tools | 00:11:00 | ||
Section 04: Wireless Networks | |||
4.1 Wireless Networks Benefits | 00:09:00 | ||
4.2 Types of Wireless Networks | 00:12:00 | ||
4.3 Wireless Networks Protocol (Wi-Fi) | 00:07:00 | ||
4.4 Wireless Networks Devices | 00:10:00 | ||
4.5 Wireless Networks Drawbacks | 00:09:00 | ||
Section 05: Network Security | |||
5.1 Security Goals | 00:09:00 | ||
5.2 Securing the Network Design | 00:10:00 | ||
5.3 TCP/IP Security and Tools | 00:12:00 | ||
5.4 Port Scanning and Tools | 00:11:00 | ||
5.5 Sniffing and Tools | 00:10:00 | ||
Section 06: Firewalls and Honeypots | |||
6.1 Reasons to Use Firewall | 00:13:00 | ||
6.2 Firewalls Rules | 00:11:00 | ||
6.3 Firewalls Filtering | 00:09:00 | ||
6.4 Honeypots | 00:07:00 | ||
6.5 Bypassing Firewalls | 00:08:00 | ||
Section 07: Intrusion Detection and Prevention System | |||
7.1 Intrusion Detection System: IDS | 00:11:00 | ||
7.2 Network IDS: NIDS | 00:06:00 | ||
7.3 NIDS Challenges | 00:09:00 | ||
7.4 Snort as NIDS | 00:08:00 | ||
7.5 Intrusion Prevention Systems: IPS | 00:07:00 | ||
Section 08: Wireless Network Security | |||
8.1 Wired Equivalent Privacy WEP Attacking | 00:11:00 | ||
8.2 WPA and AES Protocols | 00:09:00 | ||
8.3 Wireless Security Misconceptions | 00:09:00 | ||
8.4 Wireless Attacks and Mitigation | 00:09:00 | ||
8.5 Secure Network Design with Wireless | 00:09:00 | ||
Section 09: Physical Security and Incident Handling | |||
9.1 Physical Security Objectives | 00:11:00 | ||
9.2 Physical Threats and Mitigation | 00:11:00 | ||
9.3 Defense in Depth (DiD) | 00:07:00 | ||
9.4 Incident | 00:06:00 | ||
9.5 Incident Handling | 00:14:00 | ||
Section 10: Network Security: Conclusion | |||
10.1 Confidentiality, Integrity, and Availability (CIA) | 00:06:00 | ||
10.2 Assets, Threats, and Vulnerabilities | 00:04:00 | ||
10.3 Risks and Network Intrusion | 00:06:00 | ||
10.4 Common Attacks | 00:09:00 | ||
10.5 Security Recommendations | 00:06:00 | ||
Assignment | |||
Assignment - Computer Networks Security from Scratch to Advanced | 00:00:00 |
Studyhub is a premier online learning platform which aims to help individuals worldwide to realise their educational dreams. For 5 years, we have been dedicated...