[100%OFF]Computer works Security from Scratch to Advanced


Description

By the end of this course you will be fully aware of the wired and wireless computer works basics, devices, and protocols in a step-by-step pace. You will also reach the professional level in works security in terms of concepts, technologies, and tools. The course requires no background or pre-requisite, yet you will be able to understand all the up-to-date terminologies in the works security during the lectures.Computer works Security from Scratch to Advanced

Computer works Security from Scratch to Advanced

This course is organized as follows:

Section One: introduction to Computer works

  • Lecture 1: What is a Computer work?
  • Lecture 2: Computer works Topologies
  • Lecture 3: Computer works Categories
  • Lecture 4: Computer works Devices and Services
  • Lecture 5: Computer works Transmission Media

Section Two: ISO/OSI Model (7 Layers)

  • Lecture 1: Why ISO/OSI Model?
  • Lecture 2: Application, Presentation, and Session Layers
  • Lecture 3: Transport and work Layers
  • Lecture 4: Data Link and Physical Layers
  • Lecture 5: ISO/OSI Model in Action

Section Three: TCP/IP Protocol Suite

  • Lecture 1: Introduction to Computer works Protocols
  • Lecture 2: IP Protocol
  • Lecture 3: TCP and UDP Protocols
  • Lecture 4: Application Protocols
  • Lecture 5: TCP/IP Characteristics and Tools

Section Four: Wireless works

  • Lecture 1: Wireless works Benefits
  • Lecture 2: Wireless works Types
  • Lecture 3: Wireless works Protocol (Wi-Fi)
  • Lecture 4: Wireless works Devices
  • Lecture 5: Wireless works Drawbacks

Section Five: Computer works Security

  • Lecture 1: Security Goals
  • Lecture 2: Securing the work Design
  • Lecture 3: TCP/IP Security and Tools
  • Lecture 4: Port Scanning and Tools
  • Lecture 5: Sniffing and Tools

Section Six: Firewalls and Honeypots

  • Lecture 1: Why Using a Firewall?
  • Lecture 2: Firewalls Rules
  • Lecture 3: Firewalls Filtering
  • Lecture 4: Honey Pots
  • Lecture 5: Bypassing Firewalls

Section Seven: Intrusion Detection and Prevention systems (IDS/IPS)

  • Lecture 1: What is Intrusion Detection Systems (IDS)?
  • Lecture 2: work IDS (NIDS)
  • Lecture 3: NIDS Challenges
  • Lecture 4: Snort as NIDS
  • Lecture 5: Intrusion Prevention Systems (IPS)

Section Eight: Wireless works Security

  • Lecture 1: Wired Equivalent Privacy WEP Attacking
  • Lecture 2: WPA and AES Protocols
  • Lecture 3: Wireless Security Misconceptions
  • Lecture 4: Wireless Attacks and Mitigation
  • Lecture 5: Secure work Design with Wireless

Section Nine: Physical Security & Incident Handling

  • Lecture 1: Physical Security Objectives
  • Lecture 2: Physical Threats and Mitigation
  • Lecture 3: Defense in Depth (DiD)
  • Lecture 4: What is an Incident?
  • Lecture 5: Incident Handling

Section Ten: Computer works Security Conclusion

  • Lecture 1: Confidentiality, Integrity, and Availability (CIA)
  • Lecture 2: Assets, Threats, and Vulnerabilities
  • Lecture 3: Risks and work Intrusion
  • Lecture 4: Common Attacks
  • Lecture 5: Security Recommendations

Who this course is for:

  • work administrators
  • Cyber security officers
  • Computer science undergraduates
  • Computer engineering undergraduates
  • work security postgraduates
  • work technical support specialists
  • Security incident handlers
  • IT Engineers and CEOs
  • Software Developers
  • Web Developers
  • Mobile Applications Developers

ALSO CHECK: [100% OFF] Windows Server 2019 – Go from Zero to Hero (2020)

Be the first to comment

Leave a Reply

Your email address will not be published.


*