Course Overview

With the advancement of technology and computing world, our identities are increasing online, and the risk of theft has never been so high. With newer techniques, the attackers are always on the lookout for an opportunity and hence we must be equally prepared for the battle that is a never-ending one.

This course will help you understand computer security and network security. During this course, you will go through various aspects in computer and network security and will be able to understand about different security aspects.

By the end of this course, you will be fully aware of the wired and wireless?computer networks basics, devices, and protocols in a step-by-step pace. You will also reach the professional level in?networks security in terms of concepts,?technologies, and tools. The course requires no background or pre-requisite, yet you will be able to understand?all the up-to-date terminologies in the network's security during the lectures.

What You Will Learn

  • Introduction to Computer Networks.
  • Understand about ISO/OSI Model (7 Layers).
  • Familiarize with TCP/IP Protocol Suite.
  • Introduction to Wireless Networks.
  • Gain In-depth Knowledge about Computer Networks Security.
  • Understand about Firewalls and Honeypots.
  • Familiarize with Intrusion Detection and Prevention systems (IDS/IPS).
  • Introduction to Wireless Networks Security.
  • Introduction to Physical Security & Incident Handling.
  • Understand about Computer Networks Security Recommendations.

Program Curriculum

  • What is a Computer Network?
  • Computer Networks Topologies
  • Computer Networks Categories
  • Computer Networks Devices and Services
  • Computer Networks Transmission Media
  • $7 Million Cybersecurity Scholarship by EC-Council
  • Chapter 1 Quiz

  • Why ISO/OSI Model?
  • Application, Presentation, and Session Layers
  • Transport and Network Layers
  • Data Link and Physical Layers
  • ISO/OSI Model in Action
  • Chapter 2 Quiz

  • Introduction to Computer Networks Protocols
  • IP Protocol
  • TCP and UDP Protocols
  • Application Protocols
  • TCP/IP Characteristics and Tools
  • Chapter 3 Quiz

  • Wireless Networks Benefits
  • Wireless Network Types
  • Wireless Networks Protocol (Wi-Fi)
  • Wireless Networks Devices
  • Wireless Networks Drawbacks
  • Chapter 4 Quiz

  • Security Goals
  • Securing the Network Design
  • TCP/IP Security and Tools
  • Port Scanning and Tools
  • Sniffing and Tools
  • Chapter 5 Quiz

  • Why Using a Firewall?
  • Firewalls Rules
  • Firewalls Filtering
  • Honeypots
  • Bypassing Firewalls
  • Chapter 6 Quiz

  • What is Intrusion Detection Systems (IDS)?
  • Network IDS (NIDS)
  • NIDS Challenges
  • Snort as NIDS
  • Intrusion Prevention Systems (IPS)
  • Chapter 7 Quiz

  • Wired Equivalent Privacy WEP Attacking
  • WPA and AES Protocols
  • Wireless Security Misconceptions
  • Wireless Attacks and Mitigation
  • Secure Network Design with Wireless
  • Chapter 8 Quiz

  • Physical Security Objectives
  • Physical Threats and Mitigation
  • Defence in Depth (DiD)
  • What is an Incident?
  • Incident Handling
  • Chapter 9 Quiz

  • Confidentiality, Integrity, and Availability (CIA)
  • Assets, Threats, and Vulnerabilities
  • Risks and Network Intrusion
  • Common Attacks
  • Security Recommendations
  • Chapter 10 Quiz
Load more modules

Instructor

Mohammad Adly Adly

Dr. Mohammad Adly Ph. D. Networks and Cybersecurity, Faculty of Electronic Engineering, Menoufiya University, Egypt, 2014 M. Sc. Computer Science and Engineering, Faculty of Electronic Engineering, Menoufiya University, Egypt, 2005 Researcher in IRISA, Rennes University, France, 2001 B. Sc. Communication and Electronic Engineering, Cairo University, 1998, Egypt Main research interests include computer networks and protocols, cybersecurity, congestion control, QoS, and multimedia networking Published more than 10 papers in reputed international journals proceedings and supervised more than 50 graduation projects

Join over 1 Million professionals from the most renowned Companies in the world!

certificate

Fastest Way to Level Up Your Cybersecurity Skills

Invest in your future with flexible subscription plans that give you access to the world’s largest online cybersecurity course library. Whether you're exploring cybersecurity courses for beginners or advancing your expertise,
access in-demand courses, practical labs, and CTF challenges designed to support continuous learning.

Monthly Plans
Annual Plans
Save 20% with our annual plans!

Pro

Build your cybersecurity skills with 900+ bite-sized courses and curated learning paths designed for continuous learning.

$ 69.00
Billed monthly or $599.00 billed annually

What is included

  • 880+ Premium Short Courses
  • 70+ Structured Learning Paths
  • Validation of Completion with all courses and learning paths
  • New Courses added every month
Early Access Offer

Pro +

Develop real-world cybersecurity skills through hands-on labs and CTF challenges designed for practical learning.

$ 79.00
Billed monthly or $699.00 billed annually

Everything in Pro, Plus:

  • 1600+ Hands-on lab exercises with guided instructions
  • 150+ CTF Challenges with detailed walkthroughs
  • New Hands-on Labs and Challenges added every month

Related Courses

1 of 50