Course curriculum

  1. 01
    • Introduction

    • What is Computer

    • Computer Networks Topologies

    • Computer Networks Categories

    • Computer Networks Devices and Services

    • Computer Networks Transmission Media

  2. 02
    • Why ISO/OSI Model?

    • Application, Presentation, and Session Layers

    • Transport and Network Layers

    • Data Link and Physical Layers

    • ISO/OSI Model in Action

  3. 03
    • Introduction to Computer Networks Protocols

    • IP Protocol

    • TCP and UDP Protocols

    • Application Protocols

    • TCP/IP Characteristics and Tools

  4. 04
    • Wireless Networks Benefits

    • Wireless Networks Types

    • Wireless Networks Protocol (Wi-Fi)

    • Wireless Networks Devices

    • Wireless Networks Drawbacks

  5. 05
    • Security Goals

    • Securing the Network Design

    • TCP/IP Security and Tools

    • Port Scanning and Tools

    • Sniffing and Tools

  6. 06
    • Why Using a Firewall?

    • Firewalls Rules

    • Firewalls Filtering

    • Honeypots

    • Bypassing Firewalls

  7. 07
    • What is Intrusion Detection Systems (IDS)?

    • Network IDS (NIDS)

    • NIDS Challenges

    • Snort as NIDS

    • Intrusion Prevention Systems (IPS)

  8. 08
    • Wired Equivalent Privacy WEP Attacking

    • WPA and AES Protocols

    • Wireless Security Misconceptions

    • Wireless Attacks and Mitigation

    • Secure Network Design with Wireless

  9. 09
    • Physical Security Objectives

    • Physical Threats and Mitigation

    • Defense in Depth (DiD)

    • What is an Incident?

    • Incident Handling

  10. 10
    • Confidentiality, Integrity, and Availability (CIA)

    • Assets, Threats, and Vulnerabilities

    • Risks and Network Intrusion

    • Common Attacks

    • Security Recommendations