Learning Course is designed to support learners. When you make a purchase through one of our links, we may receive an affiliate commission.

Fundamentals of Network Security

Overview

By the end of this course you will be fully aware of the wired and
wireless computer networks basics, devices, network based vulnerabilities and protocols in a
step-by-step pace. You will also reach the professional level
in networks security in terms of concepts, technologies, and tools. The
course requires no background or pre-requisite, yet you will be able to
understand all the up-to-date terminologies in the networks security
during the lectures.

This course is organized as follows:

    • Section
      1:
      Introduction Lecture 
    •  1:
      Introduction

        • Section
          2:
          Understanding the OSI Model

          The functionality of the OSI Model

        • Lecture2:
          OSI Model 

        • Lecture3:
          Data Encapsulation and De-Encapsulation

        • Lecture4:
          TCP/IP Model

        • Quiz
          1:
          Section 2 Review Quiz

    • Section
      3:
      Internet Protocol

      The functionality of the Internet Protocol

    • Lecture5:
      Introduction to the Internet Protocol

    • Lecture6:
      IP Addressing

    • Lecture7:
      IP Address Classes

    • Lecture
      8:
      Reserved IP Addresses

    • Lecture
      9:
      Public and Private IP Addresses

    • Lecture
      10:
      IPv6 Addresses

    • Quiz
      2:
      Section 3 Review Quiz

    • Section
      4:
      Transmission Control Protocol

      The functionality of Transmission Control Protocol

    • Lecture
      11:
      Introduction to Transmission Control Protocol

    • Lecture
      12:
      TCP Three-Way Handshake

    • Quiz
      3:
      Section 4 Review Quiz

    • Section
      5:
      User Datagram Protocol

      The functionality of the User Datagram Protocol

    • Lecture
      13:
      Introduction to the User Datagram Protocol

    • Lecture
      14:
      TCP and UDP Ports

    • Lecture
      15:
      Address Resolution Protocol

    • Lecture
      16:
      Host-to-Host Packet Delivery Using TCP

    • Lecture
      17:
      Wireshark

    • Quiz
      4:
      Section 5 Review Quiz

    • Section
      6:
      Vulnerabilities

      Network Vulnerabilities

    • Lecture
      18:
      TCP/IP Vulnerabilities

      (Preview enabled)

    • Lecture
      19:
      IP Vulnerabilities

    • Lecture
      20:
      ICMP Vulnerabilities

    • Lecture
      21:
      TCP Vulnerabilities

    • Lecture
      22:
      TCP Session Hijacking

    • Lecture
      23:
      UDP Vulnerabilities

Fundamentals of Network Security

Reviews

John Doe
John Doe@username
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
John Doe
John Doe@username
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
John Doe
John Doe@username
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
Scroll to Top