Computer Networking and Cyber Security

0( 0 REVIEWS )
5 STUDENTS

Educational accomplishments and income are closely correlated. Education and skill with endorsed certificates from credible and renowned authorities typically lead to better jobs with attractive salaries. Educated and skilled workers also have lower rates of unemployment. Therefore, skills and endorsed certificates to showcase are essential for people early in their careers.

Imperial Academy offers this premium Computer Networking and Cyber Security course to ensure security in your career. In addition, this comprehensive Computer Networking and Cyber Security course will assist you in building relevant skills that will help you find a job in the related sectors. Also, the Certificate you’ll get after completing the Computer Networking and Cyber Security will put your head and shoulder above others in front of potential employers.

Become the person who would attract the results you seek. What you plant now, you will harvest later. So, grab this opportunity and start learning Computer Networking and Cyber Security!

Learn at your own pace from the comfort of your home, as the rich learning materials of this premium course is accessible from any place at any time. The advanced course curriculums are divided into tiny bite-sized audio-visual modules by industry specialists with years of experience behind them.

Course Curriculum

Section 01: Introduction to Cyber Security Masterclass Course
Course Introduction 00:04:00
Section 02: Complete Computer Networking for Cybersecurity and Ethical Hacking
What is a Network? 00:04:00
What is a Local Area Network? 00:03:00
Routers and LAN 00:03:00
Network Components 00:07:00
WAN and MPLS 00:06:00
Peer to Peer Network Architecture 00:04:00
Client-Server Network Architecture 00:04:00
Bus and Star Topology 00:06:00
Mesh and Ring Topology 00:05:00
Other Network Topologies that you should know! 00:08:00
Quick Recap 00:03:00
Introduction to Internetworking Models 00:03:00
Layered Approach and Advantages 00:05:00
Introduction to OSI Model 00:06:00
OSI Model: Application Layer 00:04:00
OSI Model: Presentation and Session Layer 00:02:00
OSI Model: Transport Layer 00:02:00
Connection Oriented vs Connectionless Service 00:06:00
What is Flow Control? 00:05:00
What is Windowing? 00:04:00
OSI Model: The Physical Layer 00:04:00
Quick Recap 00:04:00
What’s next? 00:02:00
What is a Coaxial Cable? 00:06:00
What is a Twisted Pair Cable? 00:03:00
What is Fibre Optic Cable? 00:06:00
Media Converters 00:05:00
UTP Categories 00:07:00
Different Wiring Standards 00:05:00
Straight Through Cable Type 00:05:00
Quick Recap 00:03:00
Welcome to Ethernet Specifications 00:02:00
Ethernet Basics 00:04:00
CSMA – CD Contention Method 00:04:00
Broadband – Baseband 00:04:00
Binary – Decimal Conversion 00:06:00
Ethernet Addressing 00:03:00
What are Ethernet Frames? 00:04:00
Ethernet at Physical Layer 00:02:00
IEEE 802.3 00:03:00
Quick Recap 00:01:00
Section 03: Networking Devices
Common Networking Devices 00:03:00
Network Interface Card (NIC) 00:02:00
Hub 00:04:00
Bridge 00:02:00
Switch 00:05:00
Router 00:05:00
Firewalls 00:05:00
IDS IPS HIDS 00:05:00
Access Points 00:03:00
Wireless Range Extenders 00:02:00
CSMA CA Introduction 00:04:00
CSMA CA Working 00:04:00
CSMA CD Introduction 00:02:00
CSMA CD Working 00:03:00
Introduction to DHCP Server 00:04:00
DHCP Operations 00:05:00
Introduction to Other devices 00:01:00
Multilayer Switch and Load Balancer 00:04:00
Introduction to DNS Server 00:05:00
DNS Record types 00:07:00
Types of DNS Servers 00:03:00
Proxy Servers 00:05:00
Encryption Devices 00:03:00
Analog Modems, Packet Shaper and VPN Concentrator 00:04:00
Media Converters and Next Generation Firewalls 00:02:00
Benefits of Routers 00:02:00
Quick Recap 00:04:00
Section 04: Getting Started with Cybersecurity!
What is Security? 00:06:00
What is Cybersecurity? 00:05:00
History of Cybersecurity 00:07:00
How to start a career in Cybersecurity? 00:06:00
Different Careers in Cybersecurity 00:10:00
Key Terms in Cyber Security 00:06:00
Elements of Information Security 00:07:00
Section 05: Fundamentals of Cybersecurity
Types of Actors 00:09:00
Passive Attacks in Cybersecurity 00:05:00
Active Attacks in Cybersecurity 00:05:00
Security Organizations 00:05:00
Section 06: Key Security Concepts
Security Architect’s View of Cybersecurity 00:06:00
Security Services and Mechanisms 00:06:00
Security Attacks! 00:07:00
Section 07: Cryptography - Securing your Data
What is Cryptography? 00:05:00
What is Symmetric Encryption? 00:03:00
AES and DES Standards in Cryptography 00:06:00
Asymmetric Encryption 00:03:00
Hashing 00:07:00
PKI and CA 00:10:00
RSA and Diffie Hellman Algorithms 00:07:00
What are Digital Signatures? 00:09:00
Transport Layer Security (TLS) Encryption 00:04:00
Generating Hashes using HashCal 00:04:00
Understanding Encryption and Decryption’ 00:05:00
Section 08: Introduction to Ethical Hacking
Hacking Terms 00:07:00
Vulnerability Assessment and Penetration Testing 00:09:00
Pentesting Methodologies 00:07:00
Types of Penetration Tests 00:06:00
Phases of Penetration Testing 00:04:00
10 Steps SECURITY EXPERTS follow! 00:04:00
Section 09: Setting up your own Penetration Testing Lab
What is Linux Operating System? 00:04:00
Have you heard of Kali Linux? 00:03:00
Installing Virtual Box 00:06:00
Installing KALI Linux in Virtual Box 00:12:00
Installing Metasploitable Machine in Virtual Box 00:09:00
Installing Damn Vulnerable Web Application (DVWA) in KALI Linux 00:18:00
Installing TOR Browser 00:09:00
Executing Linux Commands – Part 1 00:12:00
Executing Linux Commands – Part 2 00:14:00
Section 10: Information Gathering - Reconnaissance
What is Information Gathering? 00:08:00
Information Gathering using MALTEGO – Part 1 00:07:00
Information Gathering using MALTEGO – Part 2 00:06:00
Information Gathering using HTTRACK 00:05:00
Information Gathering using THE HARVESTER 00:02:00
Information Gathering using OSINT Framework 00:05:00
Information Gathering using NSLOOKUP 00:03:00
Information Gathering using REDHAWK 00:05:00
Information Gathering using SHODAN 00:09:00
Section 11: Scanning and Enumeration
What is Scanning? 00:07:00
What is NMAP Tool? 00:05:00
How to use Zenmap GUI? 00:17:00
What is Enumeration? 00:03:00
Types of Enumeration 00:03:00
Enumeration using Super Scan Tool 00:07:00
Enumeration Using Hyena Tool 00:06:00
Section 12: Vulnerability Assessment and Penetration Testing
What is Vulnerability Assessment? 00:04:00
Phases of Vulnerability Assessment 00:08:00
What are Vulnerability Scoring Systems? 00:09:00
Introduction to Nessus Tool 00:05:00
Create and Configure Network Scan using Nessus 00:08:00
Launching a Scan in Nessus Tool 00:08:00
Section 13: Firewall
What is an Intrusion Detection System? 00:11:00
What is a Firewall? 00:10:00
What is a Demilitarized Zone (DMZ)? 00:06:00
How to evade Intrusion Detection System? 00:08:00
How to evade Firewall? 00:09:00
Firewall Pentesting 00:02:00
Section 14: Web Application Penetration Testing
Introduction to Web Servers 00:05:00
Web Server Attacks 00:05:00
Web Server Penetration Testing 00:04:00
How to protect web servers from getting hacked? 00:05:00
OWASP Top 10 Vulnerabilities – Part 1 00:05:00
OWASP Top 10 Vulnerabilities – Part 2 00:07:00
Website Footprinting – Part 1 00:05:00
Website Footprinting – Part 2 00:03:00
Exploiting Basic Command Execution Vulnerability 00:06:00
Exploiting Basic Command Execution Vulnerability 00:07:00
How to configure Burp Suite? 00:16:00
Exploiting Basic File Upload Vulnerability 00:10:00
Exploiting Advance File Upload Vulnerability 00:07:00
Exploiting more advance File Upload Vulnerability 00:08:00
What is SQL Injection? 00:04:00
Types of SQL Injections 00:05:00
How to exploit SQL Injection manually? 00:17:00
Automating SQL Injection using SQLMap 00:09:00
How to prevent SQL Injection? 00:03:00
What is Cross Site Scripting (XSS) Vulnerability? 00:03:00
Types of Cross Site Scripting Vulnerability 00:06:00
Exploiting XSS vulnerability – Part 1 00:11:00
Exploiting XSS vulnerability – Part 2 00:05:00
Exploiting XSS vulnerability – Part 3 00:11:00
How to prevent XSS Attacks? 00:04:00
What is Cross Site Request Forgery (CSRF)? 00:06:00
Exploiting Cross Site Request Forgery Vulnerability 00:07:00
What is a Brute Force Attack? 00:05:00
Getting Usernames and Passwords using Brute Forcing 00:18:00
How to carry out a complete Web Application Penetration Test? 00:09:00
How to protect Web Applications? 00:06:00
Section 15: Denial of Service
What is Denial of Service? 00:03:00
Types of DOS Attacks? 00:05:00
What is a Botnet? 00:03:00
Section 16: Malware Threats
What is a Malware? 00:09:00
What are Trojans? 00:08:00
Types of Trojans 00:08:00
Introduction to Virus 00:07:00
Types of Virus 00:10:00
How to prevent against Malware? 00:07:00
Section 17: Social Engineering - The Art of Human Exploitation
What is Social Engineering? 00:05:00
Types of Social Engineering Techniques 00:06:00
Getting user credentials using BEEF – Part 1 00:09:00
Getting user credentials using BEEF – Part 2 00:11:00
Section 18: Writing a Penetration Testing Report
What is a Pentest Report? 00:08:00
Components of a Penetration Test Report 00:14:00

Certificate of Achievement

Learners will get an certificate of achievement directly at their doorstep after successfully completing the course!

It should also be noted that international students must pay £10 for shipping cost.

CPD Accredited Certification

Upon successfully completing the course, you will be qualified for CPD Accredited Certificate. Certification is available –

Course Info

5 Enrolled
  • IT & Software
  • Personal Development
PRIVATE COURSE
  • PRIVATE
  • 1 year
  • Number of Units183
  • Number of Quizzes0
  • 17 hours, 53 minutes

© 2024 IMPERIAL ACADEMY COPYRIGHT