Computer Networks Security from Scratch to Advanced shailab caz4

  • Category Other
  • Type Tutorials
  • Language English
  • Total size 892.7 MB
  • Uploaded By caz4
  • Downloads 590
  • Last checked 33 minutes ago
  • Date uploaded 1 month ago
  • Seeders 12
  • Leechers 16

Infohash : 721DF586EB21C079F1A051F1A4EF2706D1A9AFFD

BTC - 1CZ4nTozpgfgqufWhiXDtBu9pVurd41SPz



Description
By the end of this course you will be fully aware of the wired and wireless computer networks basics, devices, and protocols in a step-by-step pace. You will also reach the professional level in networks security in terms of concepts, technologies, and tools. The course requires no background or pre-requisite, yet you will be able to understand all the up-to-date terminologies in the networks security during the lectures.

This course is organized as follows:

Section One: introduction to Computer Networks

Section Two: ISO/OSI Model (7 Layers)

Section Three: TCP/IP Protocol Suite

Section Four: Wireless Networks

Section Five: Computer Networks Security

Section Six: Firewalls and Honeypots

Section Seven: Intrusion Detection and Prevention systems (IDS/IPS)

Section Eight: Wireless Networks Security

Section Nine: Physical Security & Incident Handling

Section Ten: Computer Networks Security Conclusion

Files:

computer-networks-security-from-scratch-to-advnaced-caz4 03_TCPIP_Protocol_Suite
  • 012_Introduction_to_Computer_Networks_Protocols.mp4 (19.5 MB)
  • 016_TCPIP_Characteristics_and_Tools.mp4 (26.7 MB)
  • 015_Application_Protocols.mp4 (19.9 MB)
  • attached_files 012 Introduction to Computer Networks Protocols
    • Sec3-Lec1.pptx (837.2 KB)
    015 Application Protocols
    • Sec3-Lec4.pptx (641.1 KB)
    014 TCP and UDP Protocols
    • Sec3-Lec3.pptx (201.3 KB)
    013 IP Protocol
    • Sec3-Lec2.pptx (278.0 KB)
    016 TCPIP Characteristics and Tools
    • Sec3-Lec5.pptx (336.4 KB)
  • 013_IP_Protocol.mp4 (22.5 MB)
  • quizzes
    • 003 Quiz on Section Three.html (6.4 KB)
  • 014_TCP_and_UDP_Protocols.mp4 (20.9 MB)
    • bhattt.txt (0.1 KB)
    • 10_Computer_Networks_Security_Conclusion attached_files 047 Confidentiality Integrity and Availability CIA
      • Sec10-Lec1.pptx (161.6 KB)
      • 047 Confidentiality Integrity and Availability CIA.mp4 (10.9 MB)
      • 048 Assets Threats and Vulnerabilities.mp4 (7.5 MB)
      • quizzes
        • 010 Quiz on Section Ten.html (1.5 KB)
      • 050 Common Attacks.mp4 (16.2 MB)
      • 049 Risks and Network Intrusion.mp4 (10.1 MB)
      • 051 Security Recommendations.mp4 (11.0 MB)
      • 07_Intrusion_Detection_and_Prevention_systems_IDSIPS
        • 036_Intrusion_Prevention_Systems_IPS.mp4 (12.3 MB)
        • 035_Snort_as_NIDS.mp4 (14.5 MB)
        • 033_Network_IDS_NIDS.mp4 (10.8 MB)
        • attached_files 032 What is Intrusion Detection Systems IDS
          • Sec7-Lec1.pptx (107.9 KB)
          033 Network IDS NIDS
          • Sec7-Lec2.pptx (106.3 KB)
          035 Snort as NIDS
          • Sec7-Lec4.pptx (119.8 KB)
          034 NIDS Challenges
          • Sec7-Lec3.pptx (112.8 KB)
          036 Intrusion Prevention Systems IPS
          • Sec7-Lec5.pptx (106.2 KB)
          quizzes
          • 007 Quiz on Section Seven.html (6.3 KB)
        • 032_What_is_Intrusion_Detection_Systems_IDS.mp4 (19.0 MB)
        • 034_NIDS_Challenges.mp4 (14.9 MB)
        • 06_Firewalls_and_Honeypots
          • 031_Bypassing_Firewalls.mp4 (22.4 MB)
          • attached_files 031 Bypassing Firewalls
            • Sec6-Lec5.pptx (122.1 KB)
            029 Firewalls Filtering
            • Sec6-Lec3.pptx (155.1 KB)
            027 Why Using a Firewall
            • Sec6-Lec1.pptx (304.1 KB)
            028 Firewalls Rules
            • Sec6-Lec2.pptx (280.1 KB)
            030 Honeypots
            • Sec6-Lec4.pptx (127.3 KB)
          • 029_Firewalls_Filtering.mp4 (14.5 MB)
          • 028_Firewalls_Rules.mp4 (18.1 MB)
          • quizzes
            • 006 Quiz on Section Six.html (6.5 KB)
          • 030_Honeypots.mp4 (11.9 MB)
          • 027_Why_Using_a_Firewall.mp4 (21.8 MB)
          • 05_Computer_Networks_Security
            • 023_Securing_the_Network_Design.mp4 (17.3 MB)
            • 024_TCPIP_Security_and_Tools.mp4 (22.2 MB)
            • 025_Port_Scanning_and_Tools.mp4 (21.6 MB)
            • attached_files 023 Securing the Network Design
              • Sec5-Lec2.pptx (158.1 KB)
              024 TCPIP Security and Tools
              • Sec5-Lec3.pptx (193.0 KB)
              022 Security Goals
              • Sec5-Lec1.pptx (137.4 KB)
              025 Port Scanning and Tools
              • Sec5-Lec4.pptx (108.8 KB)
              026 Sniffing and Tools
              • Sec5-Lec5.pptx (367.2 KB)
            • 022_Security_Goals.mp4 (15.6 MB)
            • quizzes
              • 005 Quiz on Section Five.html (6.7 KB)
            • 026_Sniffing_and_Tools.mp4 (22.0 MB)
            • 01_Introduction_to_Computer_Networks
              • 006_Computer_Networks_Transmission_Media.mp4 (16.6 MB)
              • 004_Computer_Networks_Categories.mp4 (17.6 MB)
              • 005_Computer_Networks_Devices_and_Services.mp4 (18.9 MB)
              • 002_What_is_a_Computer_Network.mp4 (18.6 MB)
              • attached_files 001 Introduction
                • Course-Intro.pptx (169.1 KB)
                004 Computer Networks Categories
                • Sec1-Lec3.pptx (489.3 KB)
                002 What is a Computer Network
                • Sec1-Lec1.pptx (320.2 KB)
                005 Computer Networks Devices and Services
                • Sec1-Lec4.pptx (565.7 KB)
                006 Computer Networks Transmission Media
                • Sec1-Lec5.pptx (797.6 KB)
                003 Computer Networks Topologies
                • Sec1-Lec2.pptx (542.3 KB)
              • 003_Computer_Networks_Topologies.mp4 (20.7 MB)
              • quizzes
                • 001 Quiz on Section One.html (7.1 KB)
              • 001_Introduction.mp4 (17.6 MB)
              • 04_Wireless_Networks
                • 020_Wireless_Networks_Devices.mp4 (18.6 MB)
                • attached_files 019 Wireless Networks Protocol Wi-Fi
                  • Sec4-Lec3.pptx (820.0 KB)
                  018 Wireless Networks Types
                  • Sec4-Lec2.pptx (577.8 KB)
                  020 Wireless Networks Devices
                  • Sec4-Lec4.pptx (380.8 KB)
                  017 Wireless Networks Benefits
                  • Sec4-Lec1.pptx (455.3 KB)
                  021 Wireless Networks Drawbacks
                  • Sec4-Lec5.pptx (117.6 KB)
                • 021_Wireless_Networks_Drawbacks.mp4 (16.2 MB)
                • 017_Wireless_Networks_Benefits.mp4 (16.4 MB)
                • quizzes
                  • 004 Quiz on Section Four.html (6.4 KB)
                • 019_Wireless_Networks_Protocol_Wi-Fi.mp4 (12.2 MB)
                • 018_Wireless_Networks_Types.mp4 (22.0 MB)
                • 02_ISOOSI_Model_7_Layers
                  • 009_Transport_and_Network_Layers.mp4 (19.1 MB)
                  • 007_Why_ISOOSI_Model.mp4 (17.8 MB)
                  • attached_files 008 Application Presentation and Session Layers
                    • Sec2-Lec2.pptx (320.9 KB)
                    010 Data Link and Physical Layers
                    • Sec2-Lec4.pptx (156.9 KB)
                    009 Transport and Network Layers
                    • Sec2-Lec3.pptx (204.0 KB)
                    007 Why ISOOSI Model
                    • Sec2-Lec1.pptx (265.2 KB)
                    011 ISOOSI Model in Action
                    • Sec2-Lec5.pptx (180.3 KB)
                    quizzes
                    • 002 Quiz on Section Two.html (6.4 KB)
                  • 011_ISOOSI_Model_in_Action.mp4 (18.1 MB)
                  • 008_Application_Presentation_and_Session_Layers.mp4 (21.3 MB)
                  • 010_Data_Link_and_Physical_Layers.mp4 (15.6 MB)
                  • 08_Wireless_Networks_Security
                    • 040_Wireless_Attacks_and_Mitigation.mp4 (15.8 MB)
                    • attached_files 038 WPA and AES Protocols
                      • Sec8-Lec2.pptx (107.0 KB)
                      037 Wired Equivalent Privacy WEP Attacking
                      • Sec8-Lec1.pptx (180.7 KB)
                      041 Secure Network Design with Wireless
                      • Sec8-Lec5.pptx (192.5 KB)
                      039 Wireless Security Misconceptions
                      • Sec8-Lec3.pptx (116.7 KB)
                      040 Wireless Attacks and Mitigation
                      • Sec8-Lec4.pptx (106.4 KB)
                      quizzes
                      • 008 Quiz on Section Eight.html (6.3 KB)
                    • 039_Wireless_Security_Misconceptions.mp4 (16.6 MB)
                    • 041_Secure_Network_Design_with_Wireless.mp4 (15.4 MB)
                    • 037_Wired_Equivalent_Privacy_WEP_Attacking.mp4 (19.6 MB)
                    • 038_WPA_and_AES_Protocols.mp4 (16.0 MB)
                    • 09_Physical_Security_and_Incident_Handling
                      • 042_Physical_Security_Objectives.mp4 (19.4 MB)
                      • attached_files 043 Physical Threats and Mitigation
                        • Sec9-Lec2.pptx (349.6 KB)
                        042 Physical Security Objectives
                        • Sec9-Lec1.pptx (322.3 KB)
                        044 Defense in Depth DiD
                        • Sec9-Lec3.pptx (157.9 KB)
                        046 Incident Handling
                        • Sec9-Lec5.pptx (109.3 KB)
                        045 What is an Incident
                        • Sec9-Lec4.pptx (104.9 KB)
                      • 043_Physical_Threats_and_Mitigation.mp4 (19.8 MB)
                      • quizzes
                        • 009 Quiz on Section Nine.html (6.6 KB)
                      • 044_Defense_in_Depth_DiD.mp4 (12.7 MB)
                      • 045_What_is_an_Incident.mp4 (9.8 MB)
                      • 046_Incident_Handling.mp4 (23.8 MB)

There are currently no comments. Feel free to leave one :)