By the end of this course you will be fully aware of the wired and
wireless computer networks basics, devices, network based vulnerabilities and protocols in a
step-by-step pace. You will also reach the professional level
in networks security in terms of concepts, technologies, and tools. The
course requires no background or pre-requisite, yet you will be able to
understand all the up-to-date terminologies in the networks security
during the lectures.
This course is organized as follows:
- Section
1:
Introduction Lecture - 1:
Introduction-
-
Section
2:
Understanding the OSI ModelThe functionality of the OSI Model
-
Lecture2:
OSI Model -
Lecture3:
Data Encapsulation and De-Encapsulation -
Lecture4:
TCP/IP Model -
Quiz
1:
Section 2 Review Quiz
-
-
-
-
Section
3:
Internet ProtocolThe functionality of the Internet Protocol
-
Lecture5:
Introduction to the Internet Protocol -
Lecture6:
IP Addressing -
Lecture7:
IP Address Classes -
Lecture
8:
Reserved IP Addresses -
Lecture
9:
Public and Private IP Addresses -
Lecture
10:
IPv6 Addresses -
Quiz
2:
Section 3 Review Quiz
-
-
-
Section
4:
Transmission Control ProtocolThe functionality of Transmission Control Protocol
-
Lecture
11:
Introduction to Transmission Control Protocol -
Lecture
12:
TCP Three-Way Handshake -
Quiz
3:
Section 4 Review Quiz
-
-
-
Section
5:
User Datagram ProtocolThe functionality of the User Datagram Protocol
-
Lecture
13:
Introduction to the User Datagram Protocol -
Lecture
14:
TCP and UDP Ports -
Lecture
15:
Address Resolution Protocol -
Lecture
16:
Host-to-Host Packet Delivery Using TCP -
Lecture
17:
Wireshark -
Quiz
4:
Section 5 Review Quiz
-
-
-
Section
6:
VulnerabilitiesNetwork Vulnerabilities
-
Lecture
18:
TCP/IP Vulnerabilities(Preview enabled)
-
Lecture
19:
IP Vulnerabilities -
Lecture
20:
ICMP Vulnerabilities -
Lecture
21:
TCP Vulnerabilities -
Lecture
22:
TCP Session Hijacking -
Lecture
23:
UDP Vulnerabilities
-















