Rating 4.05 out of 5 (175 ratings in Udemy)
What you'll learn- Students will be able to Describe, compare and identify various network concepts Fundamentals of TCP/IP Describe and compare fundamental security concepts Describe network applications and the security challenges Understand basic cryptography principles
DescriptionBy the end of this course you will be fully aware of the wired and
wireless computer networks basics, devices, network based vulnerabilities and protocols in a …
Rating 4.05 out of 5 (175 ratings in Udemy)
What you'll learn- Students will be able to Describe, compare and identify various network concepts Fundamentals of TCP/IP Describe and compare fundamental security concepts Describe network applications and the security challenges Understand basic cryptography principles
DescriptionBy the end of this course you will be fully aware of the wired and
wireless computer networks basics, devices, network based vulnerabilities and protocols in a
step-by-step pace. You will also reach the professional level
in networks security in terms of concepts, technologies, and tools. The
course requires no background or pre-requisite, yet you will be able to
understand all the up-to-date terminologies in the networks security
during the lectures.
This course is organized as follows:
- Section
1:
Introduction Lecture
- 1:
Introduction
Section
2:
Understanding the OSI Model
The functionality of the OSI Model
Lecture2:
OSI Model
Lecture3:
Data Encapsulation and De-Encapsulation
Lecture4:
TCP/IP Model
Quiz
1:
Section 2 Review Quiz
Section
3:
Internet Protocol
The functionality of the Internet Protocol
Lecture5:
Introduction to the Internet Protocol
Lecture6:
IP Addressing
Lecture7:
IP Address Classes
Lecture
8:
Reserved IP Addresses
Lecture
9:
Public and Private IP Addresses
Lecture
10:
IPv6 Addresses
Quiz
2:
Section 3 Review Quiz
Section
4:
Transmission Control Protocol
The functionality of Transmission Control Protocol
Lecture
11:
Introduction to Transmission Control Protocol
Lecture
12:
TCP Three-Way Handshake
Quiz
3:
Section 4 Review Quiz
Section
5:
User Datagram Protocol
The functionality of the User Datagram Protocol
Lecture
13:
Introduction to the User Datagram Protocol
Lecture
14:
TCP and UDP Ports
Lecture
15:
Address Resolution Protocol
Lecture
16:
Host-to-Host Packet Delivery Using TCP
Lecture
17:
Wireshark
Quiz
4:
Section 5 Review Quiz
Section
6:
Vulnerabilities
Network Vulnerabilities
Lecture
18:
TCP/IP Vulnerabilities
(Preview enabled)
Lecture
19:
IP Vulnerabilities
Lecture
20:
ICMP Vulnerabilities
Lecture
21:
TCP Vulnerabilities
Lecture
22:
TCP Session Hijacking
Lecture
23:
UDP Vulnerabilities