It’s never been easier, more affordable, or more important to make choices about your education online and you trust Alpha Academy with your future.
Learn to stand out in the crowd and show your true potential to employers and customers by taking this Computer Networks Security from Scratch to Advanced course.
Choose to learn about Computer Networks Security with us, and you’ll gain the confidence, knowledge, and talent to take your career to a whole new level of possibilities.
There are plenty of opportunities to learn about this topic online, but with us, you can rest assured that you will be learning from experts and using material that has been compiled by industry professionals with a passion for teaching.
Alpha Academytutors and technicians will be with you every step of the way to guarantee your understanding of the subject matterand that you pass the final assessment with flying colours.
You won’t be given dull facts and figures. This course is full of audio and visual exercises and interaction that will surround you with the knowledgeyou need and update your skillset permanently.
Learning Outcomes of Computer Networks Security from Scratch to Advanced:
Why Choose Us?
- We use the very latest tools and applications in online education to teach you Computer Networks Security in exciting and innovative ways.
- You’ll be able to take the Computer Networks Security from Scratch to Advanced course anywhere. Learn on your laptop, be taught on your tablet, school yourself on your smartphone, practise on your PC. The choice is yours!
- Is time short? Study at the hours that suit you. As long as you have an online device, you can learn at any time of the day or night.
Assessment and Certification
At the end of the course, you will be required to sit an online multiple-choice test. Your test will be assessed automatically and immediately so that you will instantly know whether you have been successful. After you have successfully passed the final exam, you will be able to order an Accredited Certificate of Achievement at an additional cost of £19 for a PDF copy and £29 for an original print copy sent to you by post or for both £39.
Not only does our CPD and CiQ accredited course look good on your CV, setting you apart from the competition, it can be used as a stepping stone to greater things. Further advance your learning, launch a new career or reinvigorate an existing one.
Enrol Computer Networks Security from Scratch to Advanced
|Section 01: An Introduction to Computer Networks|
|1.1 Computer Network||00:10:00|
|1.2 Computer Network Topologies||00:11:00|
|1.3 Categories of Computer Network||00:10:00|
|1.4 Computer Network Devices||00:11:00|
|1.5 Transmission Media||00:09:00|
|Section 02: ISO/OSI Model|
|2.1 ISO/OSI Model||00:10:00|
|2.2 Application, Presentation, and Session Layers||00:12:00|
|2.3 Transport and Network Layers||00:11:00|
|2.4 Data Link and Physical Layers||00:09:00|
|2.5 ISO/OSI Model in Action||00:10:00|
|Section 03: TCP/IP Protocols|
|3.1 Introduction to Computer Networks Protocols||00:11:00|
|3.2 IP Protocol||00:13:00|
|3.3 TCP and UDP Protocols||00:12:00|
|3.4 Application Protocols||00:12:00|
|3.5 TCP/IP Characteristics and Tools||00:11:00|
|Section 04: Wireless Networks|
|4.1 Wireless Networks Benefits||00:09:00|
|4.2 Types of Wireless Networks||00:12:00|
|4.3 Wireless Networks Protocol (Wi-Fi)||00:07:00|
|4.4 Wireless Networks Devices||00:10:00|
|4.5 Wireless Networks Drawbacks||00:09:00|
|Section 05: Network Security|
|5.1 Security Goals||00:09:00|
|5.2 Securing the Network Design||00:10:00|
|5.3 TCP/IP Security and Tools||00:12:00|
|5.4 Port Scanning and Tools||00:11:00|
|5.5 Sniffing and Tools||00:10:00|
|Section 06: Firewalls and Honeypots|
|6.1 Reasons to Use Firewall||00:13:00|
|6.2 Firewalls Rules||00:11:00|
|6.3 Firewalls Filtering||00:09:00|
|6.5 Bypassing Firewalls||00:08:00|
|Section 07: Intrusion Detection and Prevention System|
|7.1 Intrusion Detection System: IDS||00:11:00|
|7.2 Network IDS: NIDS||00:06:00|
|7.3 NIDS Challenges||00:09:00|
|7.4 Snort as NIDS||00:08:00|
|7.5 Intrusion Prevention Systems: IPS||00:07:00|
|Section 08: Wireless Network Security|
|8.1 Wired Equivalent Privacy WEP Attacking||00:11:00|
|8.2 WPA and AES Protocols||00:09:00|
|8.3 Wireless Security Misconceptions||00:09:00|
|8.4 Wireless Attacks and Mitigation||00:09:00|
|8.5 Secure Network Design with Wireless||00:09:00|
|Section 09: Physical Security and Incident Handling|
|9.1 Physical Security Objectives||00:11:00|
|9.2 Physical Threats and Mitigation||00:11:00|
|9.3 Defense in Depth (DiD)||00:07:00|
|9.5 Incident Handling||00:14:00|
|Section 10: Network Security: Conclusion|
|10.1 Confidentiality, Integrity, and Availability (CIA)||00:06:00|
|10.2 Assets, Threats, and Vulnerabilities||00:04:00|
|10.3 Risks and Network Intrusion||00:06:00|
|10.4 Common Attacks||00:09:00|
|10.5 Security Recommendations||00:06:00|
No Ratings found for this course.