Fundamentals of Network Security Download
Network+ and Security+ based training with a Nessus Lab
What you’ll learn
-
Students will be able to Describe, compare and identify various network concepts Fundamentals of TCP/IP Describe and compare fundamental security concepts Describe network applications and the security challenges Understand basic cryptography principles
Requirements
-
Students should have basic networking knowledge
-
Students should have basic cyber security knowledge
Description
By the end of this course you will be fully aware of the wired and
wireless computer networks basics, devices, network based vulnerabilities and protocols in a
step-by-step pace. You will also reach the professional level
in networks security in terms of concepts, technologies, and tools. The
course requires no background or pre-requisite, yet you will be able to
understand all the up-to-date terminologies in the networks security
during the lectures.
This course is organized as follows:
-
- Section
1:
Introduction Lecture - 1:
Introduction-
- Section
2:
Understanding the OSI Model
The functionality of the OSI Model - Lecture2:
OSI Model - Lecture3:
Data Encapsulation and De-Encapsulation - Lecture4:
TCP/IP Model - Quiz
1:
Section 2 Review Quiz
- Section
-
- Section
-
- Section
3:
Internet Protocol
The functionality of the Internet Protocol - Lecture5:
Introduction to the Internet Protocol - Lecture6:
IP Addressing - Lecture7:
IP Address Classes - Lecture
8:
Reserved IP Addresses - Lecture
9:
Public and Private IP Addresses - Lecture
10:
IPv6 Addresses - Quiz
2:
Section 3 Review Quiz
- Section
-
- Section
4:
Transmission Control Protocol
The functionality of Transmission Control Protocol - Lecture
11:
Introduction to Transmission Control Protocol - Lecture
12:
TCP Three-Way Handshake - Quiz
3:
Section 4 Review Quiz
- Section
-
- Section
5:
User Datagram Protocol
The functionality of the User Datagram Protocol - Lecture
13:
Introduction to the User Datagram Protocol - Lecture
14:
TCP and UDP Ports - Lecture
15:
Address Resolution Protocol - Lecture
16:
Host-to-Host Packet Delivery Using TCP - Lecture
17:
Wireshark - Quiz
4:
Section 5 Review Quiz
- Section
-
- Section
6:
Vulnerabilities
Network Vulnerabilities - Lecture
18:
TCP/IP Vulnerabilities
(Preview enabled) - Lecture
19:
IP Vulnerabilities - Lecture
20:
ICMP Vulnerabilities - Lecture
21:
TCP Vulnerabilities - Lecture
22:
TCP Session Hijacking - Lecture
23:
UDP Vulnerabilities
- Section
Who this course is for:
- Network Analyst, Network Engineers, Network Architects
- Security Analyst, Security Engineers, Security Architects