Cybersecurity of Networks from Scratch to Advanced
Introduction
What is Computer
Computer Networks Topologies
Computer Networks Categories
Computer Networks Devices and Services
Computer Networks Transmission Media
Why ISO/OSI Model?
Application, Presentation, and Session Layers
Transport and Network Layers
Data Link and Physical Layers
ISO/OSI Model in Action
Introduction to Computer Networks Protocols
IP Protocol
TCP and UDP Protocols
Application Protocols
TCP/IP Characteristics and Tools
Wireless Networks Benefits
Wireless Networks Types
Wireless Networks Protocol (Wi-Fi)
Wireless Networks Devices
Wireless Networks Drawbacks
Security Goals
Securing the Network Design
TCP/IP Security and Tools
Port Scanning and Tools
Sniffing and Tools
Why Using a Firewall?
Firewalls Rules
Firewalls Filtering
Honeypots
Bypassing Firewalls
What is Intrusion Detection Systems (IDS)?
Network IDS (NIDS)
NIDS Challenges
Snort as NIDS
Intrusion Prevention Systems (IPS)
Wired Equivalent Privacy WEP Attacking
WPA and AES Protocols
Wireless Security Misconceptions
Wireless Attacks and Mitigation
Secure Network Design with Wireless
Physical Security Objectives
Physical Threats and Mitigation
Defense in Depth (DiD)
What is an Incident?
Incident Handling
Confidentiality, Integrity, and Availability (CIA)
Assets, Threats, and Vulnerabilities
Risks and Network Intrusion
Common Attacks
Security Recommendations