Skip to content
Sale

Computer Networks Security from Scratch to Advanced – Mohammad Adly

Rated 0 out of 5
(be the first to review)

$44.00

By the end of this course you will be fully aware of the wired and wireless computer networks basics, devices, and protocols in a step-by-step pace. You will also reach the professional level in networks security in terms of concepts, technologies, and tools. 

PURCHASE THIS COURSE, YOU ACCUMLATE: 44 POINTs!


OR

Category:

Description

Purchase Computer Networks Security from Scratch to Advanced – Mohammad Adly Course at eBokly. We actively participate in group buys and are committed to sharing knowledge with a wider audience. What's more, our courses maintain the same quality as the original sale page. You have the option to buy directly from the sale page at the full price (sale page link is provided within the post).

Computer Networks Security from Scratch to Advanced

Computer networks security concepts, technologies, devices, and tools

By the end of this course you will be fully aware of the wired and wireless computer networks basics, devices, and protocols in a step-by-step pace. You will also reach the professional level in networks security in terms of concepts, technologies, and tools. The course requires no background or pre-requisite, yet you will be able to understand all the up-to-date terminologies in the networks security during the lectures.

This course is organized as follows:

Section One: introduction to Computer Networks

  • Lecture 1: What is a Computer Network?
  • Lecture 2: Computer Networks Topologies
  • Lecture 3: Computer Networks Categories
  • Lecture 4: Computer Networks Devices and Services
  • Lecture 5: Computer Networks Transmission Media

Section Two: ISO/OSI Model (7 Layers)

  • Lecture 1: Why ISO/OSI Model?
  • Lecture 2: Application, Presentation, and Session Layers
  • Lecture 3: Transport and Network Layers
  • Lecture 4: Data Link and Physical Layers
  • Lecture 5: ISO/OSI Model in Action

Section Three: TCP/IP Protocol Suite

  • Lecture 1: Introduction to Computer Networks Protocols
  • Lecture 2: IP Protocol
  • Lecture 3: TCP and UDP Protocols
  • Lecture 4: Application Protocols
  • Lecture 5: TCP/IP Characteristics and Tools

Section Four: Wireless Networks

  • Lecture 1: Wireless Networks Benefits
  • Lecture 2: Wireless Networks Types
  • Lecture 3: Wireless Networks Protocol (Wi-Fi)
  • Lecture 4: Wireless Networks Devices
  • Lecture 5: Wireless Networks Drawbacks

Section Five: Computer Networks Security

  • Lecture 1: Security Goals
  • Lecture 2: Securing the Network Design
  • Lecture 3: TCP/IP Security and Tools
  • Lecture 4: Port Scanning and Tools
  • Lecture 5: Sniffing and Tools

Section Six: Firewalls and Honeypots

  • Lecture 1: Why Using a Firewall?
  • Lecture 2: Firewalls Rules
  • Lecture 3: Firewalls Filtering
  • Lecture 4: Honey Pots
  • Lecture 5: Bypassing Firewalls

Section Seven: Intrusion Detection and Prevention systems (IDS/IPS)

  • Lecture 1: What is Intrusion Detection Systems (IDS)?
  • Lecture 2: Network IDS (NIDS)
  • Lecture 3: NIDS Challenges
  • Lecture 4: Snort as NIDS
  • Lecture 5: Intrusion Prevention Systems (IPS)

Section Eight: Wireless Networks Security

  • Lecture 1: Wired Equivalent Privacy WEP Attacking
  • Lecture 2: WPA and AES Protocols
  • Lecture 3: Wireless Security Misconceptions
  • Lecture 4: Wireless Attacks and Mitigation
  • Lecture 5: Secure Network Design with Wireless

Section Nine: Physical Security & Incident Handling

  • Lecture 1: Physical Security Objectives
  • Lecture 2: Physical Threats and Mitigation
  • Lecture 3: Defense in Depth (DiD)
  • Lecture 4: What is an Incident?
  • Lecture 5: Incident Handling

Section Ten: Computer Networks Security Conclusion

  • Lecture 1: Confidentiality, Integrity, and Availability (CIA)
  • Lecture 2: Assets, Threats, and Vulnerabilities
  • Lecture 3: Risks and Network Intrusion
  • Lecture 4: Common Attacks
  • Lecture 5: Security Recommendations

Get Computer Networks Security from Scratch to Advanced – Mohammad Adly, Only Price $47

Course Curriculum

Introduction to Computer Networks

  • Introduction (9:57)
  • What is a Computer Network? (10:29)
  • Computer Networks Topologies (11:06)
  • Computer Networks Categories (9:47)
  • Computer Networks Devices and Services (10:38)
  • Computer Networks Transmission Media (9:19)

ISO/OSI Model (7 Layers)

  • Why ISO/OSI Model? (9:56)
  • Application, Presentation, and Session Layers (11:50)t
  • Transport and Network Layers (10:46)t
  • Data Link and Physical Layers (8:32)
  • ISO/OSI Model in Action (10:04)

TCP/IP Protocol Suite

  • Introduction to Computer Networks Protocols (10:41)
  • IP Protocol (12:53)
  • TCP and UDP Protocols (12:28)
  • Application Protocols (11:36)
  • TCP/IP Characteristics and Tools (10:39)

Wireless Networks

  • Wireless Networks Benefits (9:19)
  • Wireless Networks Types (12:14)
  • Wireless Networks Protocol (Wi-Fi) (6:47)
  • Wireless Networks Devices (10:28)
  • Wireless Networks Drawbacks (9:23)

Computer Networks Security

  • Security Goals (8:53)
  • Securing the Network Design (10:07)
  • TCP/IP Security and Tools (11:50)
  • Port Scanning and Tools (11:15)
  • Sniffing and Tools (10:18)

Firewalls and Honeypots

  • Why Using a Firewall? (12:49)
  • Firewalls Rules (10:31)
  • Firewalls Filtering (8:33)
  • Honeypots (6:42)
  • Bypassing Firewalls (8:00)

Intrusion Detection and Prevention systems (IDS/IPS)

  • What is Intrusion Detection Systems (IDS)? (11:16)
  • Network IDS (NIDS) (6:08)
  • NIDS Challenges (8:55)
  • Snort as NIDS (8:20)
  • Intrusion Prevention Systems (IPS) (7:21)

Wireless Networks Security

  • Wired Equivalent Privacy WEP Attacking (10:40)
  • WPA and AES Protocols (8:31)
  • Wireless Security Misconceptions (8:39)
  • Wireless Attacks and Mitigation (9:08)
  • Secure Network Design with Wireless (8:41)

Physical Security and Incident Handling

  • Physical Security Objectives (10:45)
  • Physical Threats and Mitigation (10:50)
  • Defense in Depth (DiD) (7:18)
  • What is an Incident? (5:40)
  • Incident Handling (13:50)

Computer Networks Security Conclusion

  • Confidentiality, Integrity, and Availability (CIA) (6:10)
  • Assets, Threats, and Vulnerabilities (4:10)
  • Risks and Network Intrusion (5:36)
  • Common Attacks (8:46)
  • Security Recommendations (6:18)

Get Computer Networks Security from Scratch to Advanced – Mohammad Adly, Only Price $47


Tag: Computer Networks Security from Scratch to Advanced – Mohammad Adly  Review. Computer Networks Security from Scratch to Advanced – Mohammad Adly download. Computer Networks Security from Scratch to Advanced – Mohammad Adly discount.


Purchase the Computer Networks Security from Scratch to Advanced – Mohammad Adly course at the best price at eBokly. Upon completing your purchase, you will gain access to the downloads page. where you can conveniently retrieve all associated course files. Additionally, we will send you a download notification email to your registered mail.

Unlock your full potential with our Computer Networks Security from Scratch to Advanced – Mohammad Adly courses. Our courses are meticulously designed to empower you with the skills and knowledge needed for excellence.

Why wait? Take the first step towards greatness by acquiring our Computer Networks Security from Scratch to Advanced – Mohammad Adly courses today. We ensure a smooth and secure purchasing experience that guarantees your peace of mind. Rest assured that your financial information is safeguarded through our trusted payment gateways, Stripe and PayPal.

Stripe, renowned for its robust security measures, offers a secure and dependable payment process. Your sensitive data is encrypted using state-of-the-art technology, ensuring its confidentiality throughout the transaction.

PayPal, a globally recognized payment platform, adds an extra layer of security. With its buyer protection program, you can make your purchase with confidence, knowing that your financial details are protected, allowing you to focus on your learning journey.

Is it secure? to Use of?
  • Rest assured, your identity remains completely confidential. We do not share your information with anyone, ensuring the utmost security when you buy the Computer Networks Security from Scratch to Advanced – Mohammad Adly course.
  • 100% Safe Checkout Privateness coverage
  • We employ robust communication and encryption methods to protect sensitive information. All card numbers are encrypted using AES at rest-256, and the transmission of card numbers occurs in a separate hosting environment, without sharing or storing any data.
How Will the Course Be Delivered?
  • Upon successful payment for the “Computer Networks Security from Scratch to Advanced – Mohammad Adly course”, Most of the products will come to you immediately. But for some products were posted for offer. Please wait for our response, it might take a few hours due to the time zone difference.
  • If this occurs, kindly be patient. Our technical department will process the link shortly, and you will receive notifications directly via email. Your patience is greatly appreciated.
What Shipping Methods Are Available?
  • You will receive a download link in the invoice or in YOUR ACCOUNT.
  • The course link is always accessible. Simply log in to your account to download the Computer Networks Security from Scratch to Advanced – Mohammad Adly course whenever you need.
  • You can study online or download the content for better results, making it accessible from any device. Ensure your system does not go to sleep during the download process..
How Do I Track Order?
  • We promptly update the status of your order following your payment. If, after 7 days, there is no download link provided, the system will automatically process a refund..
  • We love to hear from you. Please don’t hesitate to email us with any comments, questions and suggestions.

Reviews

There are no reviews yet.

Leave a customer review
Cart
Back To Top