Introduction to Computer Network Security

Video Activity

Course Objective- This course qualifies the beginners and the intermediate student to be professional in computer network security The course material is based on SANS security courses content and certifications The course covers the theoretical background about computer networks as well as the practical tools used in network security You will be a...

Join over 3 million cybersecurity professionals advancing their career
Sign up with
or

Already have an account? Sign In »

Time
3 hours 38 minutes
Difficulty
Beginner
CEU/CPE
2
Video Description

Course Objective- This course qualifies the beginners and the intermediate student to be professional in computer network security

  • The course material is based on SANS security courses content and certifications
  • The course covers the theoretical background about computer networks as well as the practical tools used in network security
  • You will be able to secure the computer networks from the design to operation by the end of the course
  • You will be aware of the concepts and tools used for monitoring the security of your network, perform penetration testing, and incident handling

The Professor- Dr. Mohammad Adly

  • B. Sc. Communications and Electronics Engineer, 1998
  • Diploma Computer Networks, 1999
  • M. Sc. Computer Networks, 2005
  • Four SAMS Certificates: GSEC, GCIH, GCFW, GAWN
  • Ph. D., Computer Networks, 2014
  • Certified Instructor from Dale Carnegie
  • Professional Instructor since 1999 in Computer Networks, Security, others

Section One:Introduction To Computer Networks- Lecture 1: What is a Computer Network?

  • Lecture 2:Computer Networks Topologies
  • Lecture 3: Computer Network Categories
  • Lecture 4: Computer Networks Devices and Services
  • Lecture 5: Computer Networks Transmission Media

Section Two: ISO/OSI Model (7 Layers)- Lecture 1: Why ISO/OSI Model

  • Lecture 2: Application, Presentation, and Session Layers
  • Lecture 3: Transport and Network Layers
  • Lecture 4: Data Link and Physical Layers
  • Lecture 5: ISO/OSI Model in Action

Section Three: TCP/IP Protocol Suite- Lecture 1: Introduction to Computer Networks Protocols

  • Lecture 2: IP Protocol
  • Lecture 3: TCP and UDP Protocols
  • Lecture 4: Application Protocols
  • Lecture 5: TCP/IP Characteristics and Tools

Section Four: Wireless Networks- Lecture 1: Wireless Networks Benefits

  • Lecture 2: Wireless Networks Types
  • Lecture 3: Wireless Networks Protocol (WiFi)
  • Lecture 4: Wireless Networks Devices
  • Lecture 5: Wireless Networks Drawbacks

Section Five: Computer Networks Security- Lecture 1: Security Goals

  • Lecture 2: Securing the Network Design
  • Lecture 3: TCP/IP Security and Tools
  • Lecture 4: Port Scanning and Tools
  • Lecture 5: Sniffing and Tools

Section Six: Firewalls and Honeypots- Lecture 1: Why Using a Firewall?

  • Lecture 2: Firewall Rules
  • Lecture 3: Firewalls Filtering
  • Lecture 4: Honey Pots
  • Lecture 5: Bypassing Firewalls

Section Seven: Intrusion Detection and Prevention Systems (ISD/IPS)- Lecture 1: What is Intrusion Detection System (IDS)?

  • Lecture 2: Network IDS
  • Lecture 3: NIDS Challenges
  • Lecture 4: Snort as NIDS
  • Lecture 5: Intrusion Prevention System (IPS)

Section Eight: Wireless Networks Security- Lecture 1: Wireless Encryption Protocol WEP Attacking

  • Lecture 2: WPA and AES Protocols
  • Lecture 3: Wireless Security Misconceptions
  • Lecture 4: Wireless Attacks and Mitigation
  • Lecture 5: Secure Network Design with Wireless

Section Nine: Physical Security and Incident Handling- Lecture 1: Physical Security Objectives

  • Lecture 2: Physical Threats and Mitigation
  • Lecture 3: Defense in Depth
  • Lecture 4: What is an Incident?
  • Lecture 5: Incident Handling

Section Ten: Computer Networks Security Conclusion- Lecture 1: Confidentiality, Integrity, and Availability (CIA)

  • Lecture 2: Assets, Threats, and Vulnerabilities
  • Lecture 3: Risks and Network Intrusion
  • Lecture 4: Common Attacks
  • Lecture 5: Security Recommendations
Video Transcription
00:00
Welcome to the computer network security from scratch to advance. Of course I am Dr Mohammed oddly, and I will be your instructor in this scores.
00:11
The objective of this course is qualifying beginners and intermediate students. To be professional in computer netter security, this course requires no background about either networking or security.
00:25
The course material is based on the material off several security courses offered by Sands Institute.
00:34
This course covers the theoretical background about computer networks and the practical tools used in network security in both essences, either academic or professional.
00:49
You will be able by the end of the scores to secure your matter from the point of design to operation
00:56
and also monitor and perform incident handling as well as print oration testing for your natural
01:03
about myself. I'm Dr Mohammed. Oddly, I hold BSC in communications and electronics engineering. Since 1998. I hold diploma in computer networks in 1999. I got my master degree in computer networks in 2005. I hold four cents certificates,
01:23
insecurity, essentials, incident handling firewalls and wireless security from sense.
01:30
I'm PhD in computer networks is 2014. I'm certified instructor from Dale Carnegie. I work as professional instructor in computer networks and security since 1999.
01:42
Let's now move to the section's off this course section One is introduction to computer networks. The first lecture answers the question off. What is a computer network? The second lecture covers the apologies used in computer networks. The third lecture is about the categories off computer networks,
02:02
and the fourth lecture is about the devices
02:06
used in computer networks such as the switches, the routers
02:09
and the service is offered by computer networks. That Lecture five focuses on the transmission media, either in the wired networks over the wireless computer networks.
02:23
Section two is about the eyes OS I model the Seven Layers. Why do we use such a model in the computer networks? This is answered in lecture. One
02:32
lecture toe speaks about the application presentation and session layers. The Upper three layers off the several years lecture three speaks about the transport and latter players
02:45
lecture four tackles and handles the data ling and physical layers off the Seven layers and Lecture five shows how this model works, how it is put in action, how it it manipulates data and sends and receives packet between each other while sending or receiving.
03:04
Section three is about the famous protocol, the standard protocol of the Internet. The TCP I P Protocol suit
03:12
Lecture One introduces this protocol and shows the meaning off the world protocol in the world of computer networks. Lecture Toe handles the I P Protocol working in Layer three, the I P addressing and Routing Lecture three handles the TCP and do the Pee protocols, working in Layer four
03:30
and the concept off the Port Number
03:31
Lecture for Handles. The application protocols working in layers far layers 56 and seven and chose the FTP the actually T p the D n as protocols. And how are they working inside the TCP I people took gold suit. Lecture five shows the characteristics of the D. C. P I. P
03:52
and starts by
03:53
handling the commands and tools working with the TCP I P, such as Ping and as Look up and other commands using the TCP I P. Protocol. So
04:04
Section four shows the wireless networks benefits and why do we go wireless? Sometimes lecture to shows the wireless networks types
04:15
lecture three shows The Wireless Network Protocol, The famous Protocol off WiFi Lecture four shows the wireless networks, devices and mainly the excess point it feed its features and how it is embedded inside the wired infrastructure. Lecture five shows the drawbacks and
04:33
what are the disadvantages off going wireless? Inside the natural
04:39
Section five is the introduction of computer, not of security, and the rest of the sections are all about the security lecture. One in this section introduces the security rules. Lecture toe shows how securing the network starts from the point of designing the network.
04:55
Lecture three shows the security issues that can be found in the TCP I people, too cold suit
05:00
and the tools that can craft some packets.
05:02
Lecture four shows the concept of bored stare, scanning and the tools that can be used. The inter Ports Gaining Lecture five shows the concept off sniffing and the tools that can be used in sniffing and how sniffing can be beneficial and how it is useful for the securing our network if done with permission.
05:21
Section six is about the firewalls and the honey pots. Why do you use a Pharrell? This question is answered. The Electra one lecture toe shows. How do we use the Fire World Rules
05:34
Lecture three
05:36
manipulates the filtering and the action off the firewall for the Packets Lecture four shows the concept off the honey pots and how and when it is used. Lecture five stars, too.
05:51
Show how the firewalls can be bypassed.
05:56
Section seven Inside This course shows the concept off intrusion detection and intrusion prevention systems ideas and i ps What is an intrusion detection system? This is covered in lecture one. How an I. D. S works inside the network and how it is
06:14
performing Toby A Network Ideas Needs. This is the subject of Lecture to What are the challenges off needs. Needs stands for network intrusion detection system, and how can it can it? Can these challenges be overcome?
06:30
Lecture four deals with snow software as network intrusion detection system. Lecture five introduces the Concept off Intrusion prevention system as immature
06:41
technology used nowadays insecurity. And that shows a very big success in the world. Off security
06:49
Section eight handles the wireless network Security
06:54
and Lecture one tackles the wildest encryption protocol W E P, and it's attacking and how this particular is obsolete right now and can be used for security
07:02
lecture to introduces the advantages off W P. A and A S protocols. And when we speak about encryption protocols, we do not handle the mathematics. But we speak about the protocols, and we handle the protocols from the point off view off the usage and off the advantages and off the comparison between them.
07:23
Lecture three handles the wireless security misconceptions. And how do people think that wireless networks can perform and can offer while it really does not offer these things, Lecture for speaks about the wireless attacks and how it can be mitigated.
07:41
Lecture five shows. How can we secure wireless network from the point off designing such network? And how do we embed the wireless infrastructure in a secure way? Inside the wire, the Infrastructure Section nine introduces the physical security
07:59
and introduces also the incident handling lecture. One is about the objectives off physical security and how the human lives are the most important object off physical security. I mean lecture to shows that physical threats and their mitigation and how the physical threats
08:18
can be overcome.
08:18
Lecture three introduces the defence in depth concept and how to make the attacker face a problem, followed by another problem and how to slow the pace off any attacker trying tow. Perform Network intrusion on your network lecture for shows What is incident handling and what
08:39
is an incident
08:41
and how an event can be considered as an event of interest, then transformed to be an incident, Lecture five demonstrates the steps off incident handling in a professional way and on scientific basis and on scientific background.
09:00
Section 10 is a conclusion, and we try to show and demonstrate the concept of the C. I A. Confidentiality, integrity and availability. A lecture to show the meaning of assets, threats and vulnerabilities In Lecture three, we define the risks and the network intrusion
09:20
in lecture for we administrate. How
09:24
are the common attacks in the world Off network security performance and in lecture five, we offer some recommendations that can be used directly to secure your natural
09:37
in a professional way.
09:39
The horse moves to you step by step, using the academic and the professional background, as well as the software tools from the level off beginner tow the level of professional insight network security domain.
09:54
Thank you
Up Next
Network Fundamentals

In this basic Network Fundamentals course, you will get an introduction to basic networking concepts to expand your knowledge about network security. You will get a complete overview of networks including wired and wireless computer networks, devices, and protocols.

Instructed By