Course Overview

Network Protocols are a set of guidelines governing the exchange of information in a simple, dependable and secure way. Network protocols are formal standards and policies comprised of rules, methodology, and configurations that define communication between two or more devices over a network. This course is designed to help understand the purpose and use of various networking protocols.  

The course will start with a basic introduction to networking and its protocols. Then you will explore the network protocol suites which include the OSI model and TCP/IP Model. Further, in this course, you will understand the role and function of networking devices and network topologies. Next, you will explore the routing and switching concepts after which you’ll learn how to create a network penetration lab and perform network penetration testing techniques. Finally, you’ll understand the need for device security and hardening.

By the end of this course, you will be able to describe common network protocols and their purpose, you will know about the routing and switching concepts, and understand how networking devices make their forwarding decisions. You will also be able to describe various network topologies and describe how traffic flows from a source to a destination.

What You Will Learn

  • You will be able to describe common network protocols and their purpose.
  • You will be able to explain the functionality of each layer of TCP/IP protocol suite.
  • You will understand the characteristics of various network topologies.
  • You will explore wireless and cloud computing technologies.
  • You will understand various routing and switching concepts.

Program Curriculum

  • Introduction 
  • Introduction to Networking
  • Exploring Common Networking Protocol and Port Numbers
  • Understanding Network Protocol Types
  • Understanding IPv4 Addressing Scheme
  • Exploring IPv6 Addressing Scheme
  • $7 Million Cybersecurity Scholarship by EC-Council
  • Chapter 1 Quiz

  • Introduction
  • Exploring the Open System Interconnect (OSI) Model
  • Exploring TCP/IP Protocol Suite
  • Chapter 2 Quiz

  • Introduction
  • Understanding the Role and Function of Networking Devices
  • Exploring Wired Network Topologies
  • Comparing Wireless Network Topologies
  • Delving into Wireless Technologies
  • Internet of Things (IoT) Technologies
  • Introduction to Cloud Computing
  • Chapter 3 Quiz

  • Introduction
  • Understanding the Properties of Network Traffic
  • Exploring the Benefits of Network Segmentation
  • Understanding Switching Concepts
  • Exploring Routing Concepts and Protocols
  • Understanding Network Address Translation (NAT)
  • Chapter 4 Quiz

  • Introduction
  • Setting up Kali Linux
  • Setting up Metasploitable 2
  • Setting up an Android Emulator

  • Introduction
  • Performing Man-in-the-Middle using Ettercap
  • Exploring Nessus Vulnerability Scanner
  • Scanning using Nmap
  • Vulnerability Discovery using Nmap NSE
  • Exploitation using Metasploit

  • Introduction
  • Understanding the Need for Device Hardening
  • Hardening Windows and Linux Systems
  • Detecting Rogue Devices on a Network
  • Conclusion
Load more modules

Instructor

Glen Singh

Author

Glen D. Singh, CEH, CHFI, CCNA (CyberOps, Security, and Routing & Switching) is a cybersecurity instructor, author, and consultant. He specializes in penetration testing, digital forensics, network security, and enterprise networking. He enjoys teaching and mentoring students, writing books, and participating in a range of outdoor activities. As an aspiring game-changer, Glen is passionate about developing cyber security awareness in his homeland, Trinidad and Tobago. Glen is also the author of the following books: Learn Kali Linux 2019 Hands-On Penetration Testing with Kali NetHunter CompTIA Network+ Certification Guide CCNA Security 210-260 Certification Guide

Join over 1 Million professionals from the most renowned Companies in the world!

certificate

Empower Your Learning with Our Flexible Plans

Invest in your future with our flexible subscription plans. Whether you're just starting out or looking to enhance your expertise, there's a plan tailored to meet your needs. Gain access to in-demand skills and courses for your continuous learning needs.

Monthly Plans
Annual Plans
Save 20% with our annual plans!

Pro

Ideal for continuous learning, offering extensive resources with 600+ courses and diverse Learning Paths to enhance your skills.

$ 499.00
Billed annually or $59.00 billed monthly

What is included

  • 700+ Premium Short Courses
  • 50+ Structured Learning Paths
  • Validation of Completion with all courses and learning paths
  • New Courses added every month
Early Access Offer

Pro +

Experience immersive learning with Practice Labs, CTF Challenges, and exclusive EC-Council certifications for comprehensive skill-building.

$ 599.00
Billed annually or $69.00 billed monthly

Everything in Pro and

  • 800+ Practice Lab exercises with guided instructions
  • 150+ CTF Challenges with detailed walkthroughs
  • New Practice Labs and Challenges added every month
  • 3 Official EC-Council Essentials Certifications¹ (retails at $897!)
    Exclusive Bonus with Annual Plans

¹This plan includes Digital Forensics Essentials (DFE), Ethical Hacking Essentials (EHE), and Network Defense Essentials (NDE) certifications. No other EC-Council certifications are included.

Related Courses

1 of 8