Fundamentals of Network Security

Network Security Course with Demonstration Labs Included

Instructed by Corey Charles

Want to access all courses?
Go for a premium subscription

  • Monthly
  • Yearly

Monthly

$ 29/mo
Billed Monthly
  • Access to all courses
    You will be able to access all the courses from any category on the platform.
  • Learning paths access
  • Access Assignments & Projects
  • Access on Mobile, PC and Tablet
  • Pause & Resume Courses Anytime
  • Offline viewing
  • Instructor Support
  • Course Completion Certificates
Subscribe Now

Yearly

$ 299/yr
Billed Annually
  • One year Unlimited Access
  • Access to all courses
    You will be able to access all the courses from any category on the platform.
  • Learning paths access
  • Access Assignments & Projects
  • Access on Mobile, PC and Tablet
  • Pause & Resume Courses Anytime
  • Offline viewing
  • Instructor Support
  • Course Completion Certificates
Subscribe Now
  • Network Analyst, Network Engineers, Network Architects
  • Security Analyst, Security Engineers, Security Architects

By the end of this course you will be fully aware of the wired and wireless computer networks basics, devices, network based vulnerabilities and protocols in a step-by-step pace. You will also reach the professional level in networks security in terms of concepts, technologies, and tools. The course requires no background or pre-requisite, yet you will be able to understand all the up-to-date terminologies in the networks security during the lectures.

  • Students should have basic networking knowledge
  • Students should have basic cyber security knowledge
  • Students will be able to Describe, compare and identify various network
  • concepts Fundamentals of TCP/IP Describe and compare fundamental
  • security concepts Describe network applications and the security
  • challenges Understand basic cryptography principles
View More...

Section 1 : Understanding the OSI Model The functionality of the OSI Model

  • Lecture 1 :
  • Lecture 2 :
  • Data Encapsulation and De-Encapsulation
  • Lecture 3 :
  • TCP/IP Model
  • Lecture 4 :
  • Introduction

Section 2 : Internet Protocol The functionality of the Internet Protocol

  • Lecture 1 :
  • Introduction to the Internet Protocol
  • Lecture 2 :
  • IP Addressing
  • Lecture 3 :
  • IP Address Classes
  • Lecture 4 :
  • Reserved IP Addresses
  • Lecture 5 :
  • Public and Private IP Addresses
  • Lecture 6 :
  • IPv6 Addresses

Section 3 : Transmission Control Protocol The functionality of Transmission Control Protocol

  • Lecture 1 :
  • Introduction to Transmission Control Protocol
  • Lecture 2 :
  • TCP Three-Way Handshake

Section 4 : User Datagram Protocol The functionality of the User Datagram Protocol

  • Lecture 1 :
  • Introduction to the User Datagram Protocol
  • Lecture 2 :
  • TCP and UDP Ports
  • Lecture 3 :
  • Address Resolution Protocol
  • Lecture 4 :
  • Host-to-Host Packet Delivery Using TCP
  • Lecture 5 :
  • Wireshark

Section 5 : Vulnerabilities Network Vulnerabilities

  • Lecture 1 :
  • TCP/IP Vulnerabilities (Preview enabled) Lecture 19: IP Vulnerabilities
  • Lecture 2 :
  • IP Vulnerabilities
  • Lecture 3 :
  • ICMP Vulnerabilities
  • Lecture 4 :
  • TCP Vulnerabilities
  • Lecture 5 :
  • TCP Session Hijacking
  • Lecture 6 :
  • UDP Vulnerabilities

Section 6 : Networking and Nessus Lab

  • Lecture 1 :
  • Nessus Practical Lab
  • Lecture 2 :
  • ARP Lab
  • Lecture 3 :
  • Trunk Lab

Corey Charles,

Corey Charles was born and grew up in New Orleans, LA. He's now been in IT Security field for 13 years and has been recognized by many of his clients for his skilled work in the vulnerability management subject matter. Mr. Charles is the owner and CEO of DreamVision IT LLC and has partnered with likes of cybrary, pluralsight and other teaching platforms to provide on demand IT Security training.
View More...

Ethical Hacking and Penetration Tes...

By : Darshil Modi

Lecture 21

Implementing & Configuring Cisco Ro...

By : Dariusz Lipski

Lecture 10

Learn NxtGen Hacking with Technolog...

By : Gopikrishna C

Lecture 80

TCP/IP: The Complete Course

By : Lazaro (Laz) Diaz

Lecture 17

The Complete Ethical Hacking Certif...

By : Mohamed Atef

Lecture 151

VoIP Configuration and Attacking (H...

By : Arpit Mittal

Lecture 6

Buy

$29

Need any help with the platform? Contact us at: support@learnfly.com