Welcome to the computer network security from scratch to advance. Of course I am Dr Mohammed oddly, and I will be your instructor in this scores.
The objective of this course is qualifying beginners and intermediate students. To be professional in computer netter security, this course requires no background about either networking or security.
The course material is based on the material off several security courses offered by Sands Institute.
This course covers the theoretical background about computer networks and the practical tools used in network security in both essences, either academic or professional.
You will be able by the end of the scores to secure your matter from the point of design to operation
and also monitor and perform incident handling as well as print oration testing for your natural
about myself. I'm Dr Mohammed. Oddly, I hold BSC in communications and electronics engineering. Since 1998. I hold diploma in computer networks in 1999. I got my master degree in computer networks in 2005. I hold four cents certificates,
insecurity, essentials, incident handling firewalls and wireless security from sense.
I'm PhD in computer networks is 2014. I'm certified instructor from Dale Carnegie. I work as professional instructor in computer networks and security since 1999.
Let's now move to the section's off this course section One is introduction to computer networks. The first lecture answers the question off. What is a computer network? The second lecture covers the apologies used in computer networks. The third lecture is about the categories off computer networks,
and the fourth lecture is about the devices
used in computer networks such as the switches, the routers
and the service is offered by computer networks. That Lecture five focuses on the transmission media, either in the wired networks over the wireless computer networks.
Section two is about the eyes OS I model the Seven Layers. Why do we use such a model in the computer networks? This is answered in lecture. One
lecture toe speaks about the application presentation and session layers. The Upper three layers off the several years lecture three speaks about the transport and latter players
lecture four tackles and handles the data ling and physical layers off the Seven layers and Lecture five shows how this model works, how it is put in action, how it it manipulates data and sends and receives packet between each other while sending or receiving.
Section three is about the famous protocol, the standard protocol of the Internet. The TCP I P Protocol suit
Lecture One introduces this protocol and shows the meaning off the world protocol in the world of computer networks. Lecture Toe handles the I P Protocol working in Layer three, the I P addressing and Routing Lecture three handles the TCP and do the Pee protocols, working in Layer four
and the concept off the Port Number
Lecture for Handles. The application protocols working in layers far layers 56 and seven and chose the FTP the actually T p the D n as protocols. And how are they working inside the TCP I people took gold suit. Lecture five shows the characteristics of the D. C. P I. P
handling the commands and tools working with the TCP I P, such as Ping and as Look up and other commands using the TCP I P. Protocol. So
Section four shows the wireless networks benefits and why do we go wireless? Sometimes lecture to shows the wireless networks types
lecture three shows The Wireless Network Protocol, The famous Protocol off WiFi Lecture four shows the wireless networks, devices and mainly the excess point it feed its features and how it is embedded inside the wired infrastructure. Lecture five shows the drawbacks and
what are the disadvantages off going wireless? Inside the natural
Section five is the introduction of computer, not of security, and the rest of the sections are all about the security lecture. One in this section introduces the security rules. Lecture toe shows how securing the network starts from the point of designing the network.
Lecture three shows the security issues that can be found in the TCP I people, too cold suit
and the tools that can craft some packets.
Lecture four shows the concept of bored stare, scanning and the tools that can be used. The inter Ports Gaining Lecture five shows the concept off sniffing and the tools that can be used in sniffing and how sniffing can be beneficial and how it is useful for the securing our network if done with permission.
Section six is about the firewalls and the honey pots. Why do you use a Pharrell? This question is answered. The Electra one lecture toe shows. How do we use the Fire World Rules
manipulates the filtering and the action off the firewall for the Packets Lecture four shows the concept off the honey pots and how and when it is used. Lecture five stars, too.
Show how the firewalls can be bypassed.
Section seven Inside This course shows the concept off intrusion detection and intrusion prevention systems ideas and i ps What is an intrusion detection system? This is covered in lecture one. How an I. D. S works inside the network and how it is
performing Toby A Network Ideas Needs. This is the subject of Lecture to What are the challenges off needs. Needs stands for network intrusion detection system, and how can it can it? Can these challenges be overcome?
Lecture four deals with snow software as network intrusion detection system. Lecture five introduces the Concept off Intrusion prevention system as immature
technology used nowadays insecurity. And that shows a very big success in the world. Off security
Section eight handles the wireless network Security
and Lecture one tackles the wildest encryption protocol W E P, and it's attacking and how this particular is obsolete right now and can be used for security
lecture to introduces the advantages off W P. A and A S protocols. And when we speak about encryption protocols, we do not handle the mathematics. But we speak about the protocols, and we handle the protocols from the point off view off the usage and off the advantages and off the comparison between them.
Lecture three handles the wireless security misconceptions. And how do people think that wireless networks can perform and can offer while it really does not offer these things, Lecture for speaks about the wireless attacks and how it can be mitigated.
Lecture five shows. How can we secure wireless network from the point off designing such network? And how do we embed the wireless infrastructure in a secure way? Inside the wire, the Infrastructure Section nine introduces the physical security
and introduces also the incident handling lecture. One is about the objectives off physical security and how the human lives are the most important object off physical security. I mean lecture to shows that physical threats and their mitigation and how the physical threats
Lecture three introduces the defence in depth concept and how to make the attacker face a problem, followed by another problem and how to slow the pace off any attacker trying tow. Perform Network intrusion on your network lecture for shows What is incident handling and what
and how an event can be considered as an event of interest, then transformed to be an incident, Lecture five demonstrates the steps off incident handling in a professional way and on scientific basis and on scientific background.
Section 10 is a conclusion, and we try to show and demonstrate the concept of the C. I A. Confidentiality, integrity and availability. A lecture to show the meaning of assets, threats and vulnerabilities In Lecture three, we define the risks and the network intrusion
in lecture for we administrate. How
are the common attacks in the world Off network security performance and in lecture five, we offer some recommendations that can be used directly to secure your natural
in a professional way.
The horse moves to you step by step, using the academic and the professional background, as well as the software tools from the level off beginner tow the level of professional insight network security domain.