CourseInfo | SimpliTrain

Computer Networking & Security

Learning plan iconE-Learning

Description

In this course, students will learn the basic working of computers, networks and how security is applied.

In this course, students will learn the basic working of computers, networks and how security is applied.

Upon successful completion of this course, students will be prepared for entry to mid- level jobs as computer network support specialists. Students will learn how to analyze network data, configure network settings, and evaluate network performance.

This course is intended for individuals who want to gain basic knowledge of Computer Networking and Security.

Lesson Id Title Description
1 Network Theory Networking Overview
Network Standards and the OSI Model
Network Types
Identify Network Configurations
Data Transmission Methods
2 Bounded Network Media Copper Media
Fiber Optic Media
Bounded Network Media Installation
Noise Control
3 Unbounded Network Media Wireless Networking
Wireless Network Devices and Components
Install a Wireless Network
4 Network Implemetations Physical Network Topologies
Logical Network Topologies
Ethernet Networks
Network Devices
VLANs
5 TCP/IP Addressing and Data Delivery The TCP/IP Protocol Suite
IPv4 Addressing
Default IP Addressing Schemes
Create Custom IP Addressing Schemes
IPv6 Address Implementation
Delivery Techniques
6 Routing Enable Static Routing
Implement Dynamic IP Routing
7 TCP/IP Services Assign IP Addresses
Domain Naming Services
TCP/IP Commands
Common TCP/IP Protocols
8 WAN Infrastructure WAN Basics
WAN Connectivity Methods
WAN Transmission Technologies
Unified Communication Technologies
9 Cloud and Virtualization Technologies Virtualization
SAN Implementations
Cloud Computing
10 Network Security Basics Introduction to Network Security
Vulnerabilities
Threats and Attacks
Authentication Methods
Encryption Methods
11 Preventing Sercurity Breaches Physical Security Controls
Network Access Controls
Install and Configure Firewalls
Harden Networks
Intrusion Detection and Prevention
Educate Users
12 Responding to Security Incidents Incident Management and Response
Basic Forensic Concepts
13 Remote Networking Remote Network Architectures
Remote Access Networking Implementations
Virtual Private Networking
VPN Protocols
14 Network Management Network Monitoring
Configuration Management Documentation
Network Performance Optimization
15 Troubleshooting Network Issues Network Troubleshooting Models
Network Troubleshooting Utilities
Hardware Troubleshooting Tools
Common Connectivity Issues
16 Appendix Appendix A: Mapping Course Content to the CompTIA Network+ Exam
Appendix B: Network Fault Tolerance and Disaster Recovery
Appendix C: Planning and Implementing a SOHO Network
Appendix D: Legend for Icons Used in Network+ Figures
17 Security Fundamentals The Information Security Cycle
Information Security Controls
Authentication Methods
Cryptography Fundamentals
Security Policy Fundamentals
18 Identifying Security Threats Social Engineering
Malware
Software-Based Threats
Network-Based Threats
Wireless Threats and Vulnerabilities
Physical Threats and Vulnerabilities
19 Managing Data, Application, and Host Security Manage Data Security
Manage Application Security
Manage Device and Host Security
Manage Mobile Security
20 Implementing Network Security Configure Security Parameters on Network Devices and Technologies
Network Design Elements and Components
Implement Networking Protocols and Services
Apply Secure Network Administration Principles
Secure Wireless Traffic
21 Implementing Access Control, Authentication, and Account Management Access Control and Authentication Services
Implement Account Management Security Controls
22 Managing Certificates Install a CA Hierarchy
Enroll Certificates
Secure Network Traffic by Using Certificates
Renew Certificates
Back Up and Restore Certificates and Private Keys
Revoke Certificates
23 Implementing Compliance and Operational Security Physical Security
Legal Compliance
Security Awareness and Training
Integrate Systems and Data with Third Parties
24 Risk Management Risk Analysis
Implement Vulnerability Assessment Tools and Techniques
Scan for Vulnerabilities
Mitigation and Deterrent Techniques
25 Troubleshooting and Managing Security Incidents Respond to Security Incidents
Recover from a Security Incident
26 Business Continuity and Disaster Recovery Planning Business Continuity
Plan for Disaster Recovery
Execute DRPs and Procedures
Self-Paced

Free

Enroll icon
This course includes: :
Full lifetime access