Course details

By the end of this course you will be fully aware of the wired and wireless computer networks basics, devices, network based vulnerabilities and protocols in a step-by-step pace. You will also reach the professional level in networks security in terms of concepts, technologies, and tools. The course requires no background or pre-requisite, yet you will be able to understand all the up-to-date terminologies in the networks security during the lectures.

This course is organized as follows:

    • Section 1: Introduction Lecture 
    •  1: Introduction


        • Section 2: Understanding the OSI Model The functionality of the OSI Model
        • Lecture2: OSI Model 
        • Lecture3: Data Encapsulation and De-Encapsulation
        • Lecture4: TCP/IP Model
        • Quiz 1: Section 2 Review Quiz

    • Section 3: Internet Protocol The functionality of the Internet Protocol
    • Lecture5: Introduction to the Internet Protocol
    • Lecture6: IP Addressing
    • Lecture7: IP Address Classes
    • Lecture 8: Reserved IP Addresses
    • Lecture 9: Public and Private IP Addresses
    • Lecture 10: IPv6 Addresses
    • Quiz 2: Section 3 Review Quiz

    • Section 4: Transmission Control Protocol The functionality of Transmission Control Protocol
    • Lecture 11: Introduction to Transmission Control Protocol
    • Lecture 12: TCP Three-Way Handshake
    • Quiz 3: Section 4 Review Quiz

    • Section 5: User Datagram Protocol The functionality of the User Datagram Protocol
    • Lecture 13: Introduction to the User Datagram Protocol
    • Lecture 14: TCP and UDP Ports
    • Lecture 15: Address Resolution Protocol
    • Lecture 16: Host-to-Host Packet Delivery Using TCP
    • Lecture 17: Wireshark
    • Quiz 4: Section 5 Review Quiz

    • Section 6: Vulnerabilities Network Vulnerabilities
    • Lecture 18: TCP/IP Vulnerabilities (Preview enabled)
    • Lecture 19: IP Vulnerabilities
    • Lecture 20: ICMP Vulnerabilities
    • Lecture 21: TCP Vulnerabilities
    • Lecture 22: TCP Session Hijacking
    • Lecture 23: UDP Vulnerabilities


Updated on 22 March, 2018
Courses you can instantly connect with... Do an online course on Networking and Security starting now. See all courses

Rate this page