Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Computer Networks Security from Scratch to Advanced
Introduction to Computer Networks
Introduction (9:57)
What is a Computer Network? (10:29)
Computer Networks Topologies (11:06)
Computer Networks Categories (9:47)
Computer Networks Devices and Services (10:38)
Computer Networks Transmission Media (9:19)
ISO/OSI Model (7 Layers)
Why ISO/OSI Model? (9:56)
Application, Presentation, and Session Layers (11:50)
Transport and Network Layers (10:46)
Data Link and Physical Layers (8:32)
ISO/OSI Model in Action (10:04)
TCP/IP Protocol Suite
Introduction to Computer Networks Protocols (10:41)
IP Protocol (12:53)
TCP and UDP Protocols (12:28)
Application Protocols (11:36)
TCP/IP Characteristics and Tools (10:39)
Wireless Networks
Wireless Networks Benefits (9:19)
Wireless Networks Types (12:14)
Wireless Networks Protocol (Wi-Fi) (6:47)
Wireless Networks Devices (10:28)
Wireless Networks Drawbacks (9:23)
Computer Networks Security
Security Goals (8:53)
Securing the Network Design (10:07)
TCP/IP Security and Tools (11:50)
Port Scanning and Tools (11:15)
Sniffing and Tools (10:18)
Firewalls and Honeypots
Why Using a Firewall? (12:49)
Firewalls Rules (10:31)
Firewalls Filtering (8:33)
Honeypots (6:42)
Bypassing Firewalls (8:00)
Intrusion Detection and Prevention systems (IDS/IPS)
What is Intrusion Detection Systems (IDS)? (11:16)
Network IDS (NIDS) (6:08)
NIDS Challenges (8:55)
Snort as NIDS (8:20)
Intrusion Prevention Systems (IPS) (7:21)
Wireless Networks Security
Wired Equivalent Privacy WEP Attacking (10:40)
WPA and AES Protocols (8:31)
Wireless Security Misconceptions (8:39)
Wireless Attacks and Mitigation (9:08)
Secure Network Design with Wireless (8:41)
Physical Security and Incident Handling
Physical Security Objectives (10:45)
Physical Threats and Mitigation (10:50)
Defense in Depth (DiD) (7:18)
What is an Incident? (5:40)
Incident Handling (13:50)
Computer Networks Security Conclusion
Confidentiality, Integrity, and Availability (CIA) (6:10)
Assets, Threats, and Vulnerabilities (4:10)
Risks and Network Intrusion (5:36)
Common Attacks (8:46)
Security Recommendations (6:18)
Teach online with
Assets, Threats, and Vulnerabilities
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock