Computer Networking & Security


E-Learning
Description
In this course, students will learn the basic working of computers, networks and how security is applied.
In this course, students will learn the basic working of computers, networks and how security is applied.
Upon successful completion of this course, students will be prepared for entry to mid- level jobs as computer network support specialists. Students will learn how to analyze network data, configure network settings, and evaluate network performance.
This course is intended for individuals who want to gain basic knowledge of Computer Networking and Security.
| Lesson Id | Title | Description |
|---|---|---|
| 1 | Network Theory |
Networking Overview Network Standards and the OSI Model Network Types Identify Network Configurations Data Transmission Methods |
| 2 | Bounded Network Media |
Copper Media Fiber Optic Media Bounded Network Media Installation Noise Control |
| 3 | Unbounded Network Media |
Wireless Networking Wireless Network Devices and Components Install a Wireless Network |
| 4 | Network Implemetations |
Physical Network Topologies Logical Network Topologies Ethernet Networks Network Devices VLANs |
| 5 | TCP/IP Addressing and Data Delivery |
The TCP/IP Protocol Suite IPv4 Addressing Default IP Addressing Schemes Create Custom IP Addressing Schemes IPv6 Address Implementation Delivery Techniques |
| 6 | Routing |
Enable Static Routing Implement Dynamic IP Routing |
| 7 | TCP/IP Services |
Assign IP Addresses Domain Naming Services TCP/IP Commands Common TCP/IP Protocols |
| 8 | WAN Infrastructure |
WAN Basics WAN Connectivity Methods WAN Transmission Technologies Unified Communication Technologies |
| 9 | Cloud and Virtualization Technologies |
Virtualization SAN Implementations Cloud Computing |
| 10 | Network Security Basics |
Introduction to Network Security Vulnerabilities Threats and Attacks Authentication Methods Encryption Methods |
| 11 | Preventing Sercurity Breaches |
Physical Security Controls Network Access Controls Install and Configure Firewalls Harden Networks Intrusion Detection and Prevention Educate Users |
| 12 | Responding to Security Incidents |
Incident Management and Response Basic Forensic Concepts |
| 13 | Remote Networking |
Remote Network Architectures Remote Access Networking Implementations Virtual Private Networking VPN Protocols |
| 14 | Network Management |
Network Monitoring Configuration Management Documentation Network Performance Optimization |
| 15 | Troubleshooting Network Issues |
Network Troubleshooting Models Network Troubleshooting Utilities Hardware Troubleshooting Tools Common Connectivity Issues |
| 16 | Appendix |
Appendix A: Mapping Course Content to the CompTIA Network+ Exam Appendix B: Network Fault Tolerance and Disaster Recovery Appendix C: Planning and Implementing a SOHO Network Appendix D: Legend for Icons Used in Network+ Figures |
| 17 | Security Fundamentals |
The Information Security Cycle Information Security Controls Authentication Methods Cryptography Fundamentals Security Policy Fundamentals |
| 18 | Identifying Security Threats |
Social Engineering Malware Software-Based Threats Network-Based Threats Wireless Threats and Vulnerabilities Physical Threats and Vulnerabilities |
| 19 | Managing Data, Application, and Host Security |
Manage Data Security Manage Application Security Manage Device and Host Security Manage Mobile Security |
| 20 | Implementing Network Security |
Configure Security Parameters on Network Devices and Technologies Network Design Elements and Components Implement Networking Protocols and Services Apply Secure Network Administration Principles Secure Wireless Traffic |
| 21 | Implementing Access Control, Authentication, and Account Management |
Access Control and Authentication Services Implement Account Management Security Controls |
| 22 | Managing Certificates |
Install a CA Hierarchy Enroll Certificates Secure Network Traffic by Using Certificates Renew Certificates Back Up and Restore Certificates and Private Keys Revoke Certificates |
| 23 | Implementing Compliance and Operational Security |
Physical Security Legal Compliance Security Awareness and Training Integrate Systems and Data with Third Parties |
| 24 | Risk Management |
Risk Analysis Implement Vulnerability Assessment Tools and Techniques Scan for Vulnerabilities Mitigation and Deterrent Techniques |
| 25 | Troubleshooting and Managing Security Incidents |
Respond to Security Incidents Recover from a Security Incident |
| 26 | Business Continuity and Disaster Recovery Planning |
Business Continuity Plan for Disaster Recovery Execute DRPs and Procedures |
Self-Paced
Free
This course includes: :
Full lifetime access