Untitled Document

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

NETWORK CYBER SECURITY COURSE OUTLINE

First Phase:

1. INTRODUCTION OF COMPUTER NETWORK


Introduction
What is a computer Network?
Computer Networks Topologies
Computer network categories
Computer networks Devices and services
Computer networks transmission media

2. ISO/OSI MODEL (7 LAYERS)


Why ISO/OSI model?
Application , presentation, and session
Transport and network layer
Date link and physical layers
ISO/OSI model in action

3. TCP/IP PROTOCOL SUITE


Introduction to computer networks protocols
IP protocol
TCP and UDP protocols
Application Protocols
TCP/IP characteristics and Tools

4. WIRELESS NETWORKS
Wireless networks benefits
Wireless networks types
Wireless networks protocols (WI-FI)
Wireless networks devices
Wireless networks drawbacks

5. COMPUTER NETWORKS SECURITY


Security goals
Securing the network design
TCP/IP Security and tools
Port scanning and tools
Sniffing tools

6. FIREWALLS AND HONEYPOTS


Why use a firewall ?
Firewalls rules
Firewalls filtering
honey pots
Bypassing firewalls

7. INTRUSION DETECTION AND PREVENTION SYSTEMS (IDS/IPS)


What are intrusion detection systems (IDMS)?
Network IDS (NIDS)
NIDS challenges
Snort as NIDS
Intrusion prevention systems (IPS)

8. WIRELESS NETWORKS SECURITY


Wired Equivalent Privacy WEP attacking
WPA and AES Protocols
Wireless Security Misconceptions
Wireless attacks mitigation
Secure Network Design with Wireless

9. PHYSICAL SECURITY AND INCIDENT HANDLING


Physical security objectives
Physical threats and mitigation
Defense in depth (DiD)
What is an incident ?
Incident Handling

10. COMPUTER NETWORKS SECURITY CONCLUSION


Confidentiality, integrity, and availability (CIA)
Assets, threats, and Vulnerabilities
Risks and Network intrusion
Common Attackes
Security Recommendations

You might also like