starweaver-logo
LOG INGET STARTED
LOG INGET STARTED
  • Browse
  • Doing

  • On Air
  • Channels
  • Career Paths
  • LEARNING

  • Courses
  • Certifications
  • Journeys
  • Test Prep
  • CONNECTING

  • How It Works
  • Community
  • Techbytes
  • Podcasts
  • Leaderboards
  • SUPPORT

  • Support & FAQs
  • Starweaver for Business
  • Starweaver for Campus
  • Teach with Starweaver
footer-brand-logo
  • COMPANY
  • About Us
  • Support and Knowledge Base
  • Policies & Terms
  • Contact
  • CONTENT
  • Courses
  • Certifications
  • Journeys
  • Test Prep
  • Meet the Gurus
  • Techbytes
  • FOR ORGANIZATIONS
  • Starweaver for Business
  • Starweaver for Campus
  • Catalogue
  • Pricing
  • Private Classes
  • PARTNER WITH US
  • Instructors & Teachers
  • Books, Writing & Publishing
  • FOLLOW US
    • facebook
    • twitter
    • linkedin
    • pinterest
    • instagram
    • youtube
Our trademarks include Starweaver®, Make genius happen™, Education you can bank on®, People are your most important assets!®, Body of Knowledge™, StarLabs™, LiveLabs™, Journeys™
© Starweaver Group, Inc. All Rights Reserved.
  1. Courses
  2. >
  3. Data Communication Networks

Data Communication Networks

This 4-hour course demystifies data communication networks, offering a comprehensive overview of the concepts, structures, and mechanisms enabling digital communication across platforms and devices.

Kevin Cardwell
Kevin Cardwell
Data Science | core | 4 hours |   Published: Aug 2024
In partnership with: Coursera

    Discussions

Overview

1KSTUDENTS*
97.9%RECOMMEND*

This course includes:

  • 4 hours of on-demand video  
  • Certificate of completion  
  • Direct access/chat with the instructor 
  • 100% self-paced online 

This dynamic 4-hour course is designed to demystify the complexities of data communication networks. It provides a comprehensive walkthrough of the concepts, structures, and mechanisms that enable digital communication across different platforms and devices. This course will help you understand what is taking place each and every time you use your computer, phone or device! 

Skills You Will Gain

IP Addressing
Network Management
Packets
PCAP
Wireshark

Learning Outcomes (At the end of this program you will be able to)

  • Identify the various components and their roles within a data communication network. 
  • Distinguish among the major types of network topologies. 
  • Assess the functions of key network protocols. 
  • Formulate basic strategies for securing a data network. 

Prerequisites

Participants should have a basic understanding of IT, computer operations, and foundational networking concepts. This background will help in grasping the advanced topics covered in the course.

Who Should Attend

This course is ideal for IT professionals, network administrators, and anyone looking to deepen their understanding of data communication networks. With content tailored for those who have foundational knowledge in IT and are eager to advance their networking skills.

Curriculum

Instructors

Frequently Asked Questions

How much do the courses at Starweaver cost?

We offer flexible payment options to make learning accessible for everyone. With our Pay-As-You-Go plan, you can pay for each course individually. Alternatively, our Subscription-Based plan provides you with unlimited access to all courses for a monthly or yearly fee.

Do you offer any certifications upon completion of a course at Starweaver?

Yes, we do offer a certification upon completion of our course to showcase your newly acquired skills and expertise.

Does Starweaver offer any free courses or trials?

No, we don't offer any free courses, but we do offer 5-day trial only on our subscriptions-based plans.

Are Starweaver's courses designed for beginners or advanced students?

Our course is designed with three levels to cater to your learning needs - Core, Intermediate, and Advanced. You can choose the level that best suits your knowledge and skillset to enhance your learning experience.

What payment options are available for Starweaver courses?

We accept various payment methods such as major credit cards, PayPal, wire transfer, and company purchase orders. For more information related to payments contact customer support.

Do you offer refunds?

Yes, we do offer a 100% refund guarantee for our courses within a specified time frame. If you are not satisfied with the course, contact our customer support team to request a refund with your order details. Some restrictions may apply.

*Where courses have been offered multiple times, the “# Students” includes all students who have enrolled. The “%Recommended” shown is also based on this data.
1Module 1.1: The Building Blocks of Data Communication
2Module 1.2: Topological Structures of Connectivity
3Module 1.3: Protocols: The Rulebooks of Networking
4Module 1.4: Fundamentals of Network Security
5Module 2.1: Network Security and Authentication
6Module 2.2: Network Virtualization
7Module 2.3: Cloud Networking
8Module 3.1: Routing Protocols Selection
9Module 3.2: Quality of Service (QoS) Configuration
10Module 3.3: Network Monitoring and Management Tools
11Module 4.1: Internet of Things (IoT) Integration
12Module 4.2: Edge Computing
13Module 4.3: Artificial Intelligence (AI) and Machine Learning (ML) in Network

Segment 01 - Introduction to Module 1

Segment 02 - The Concept of Data Networking

Segment 03 - Components of a Network Nodes and Links

Segment 04 - Data Transfer Packets, Frames, and Segments

Kevin Cardwell

Kevin Cardwell

Kevin Cardwell is a cybersecurity expert with extensive experience working with banks and financial institutions across the Middle East, Europe, and the UK. A former leader of a U.S. Department of Defense Red Team, he achieved an impressive 100% success rate in system compromise operations, demonstrating unparalleled expertise in identifying and exploiting vulnerabilities.

Kevin has led high-impact consulting projects, including engagements with Petroleum Development Oman and the Central Bank of Oman. His work includes the design and implementation of customized security baselines for high-profile clients such as Oman Airport Management Company (OAMC), ensuring resilient protection for critical infrastructure.

He is the author of several acclaimed cybersecurity courses and publications, including Building Virtual Pentesting Labs for Advanced Penetration Testing and Advanced Penetration Testing for Highly Secured Environments, 2nd Edition. His areas of specialization include advanced penetration testing, network defense, and security architecture.

As President of Cyber2Labs and Lead Consultant at CESI, Kevin continues to shape the cybersecurity landscape, helping organizations build strong digital defenses against emerging threats. He holds certifications such as Certified Advanced Network Defender and Certified Advanced Penetration Tester, underscoring his commitment to excellence in information security.

In addition to his hands-on expertise, Kevin is a passionate educator and instructor, dedicated to equipping learners with the knowledge and practical skills necessary to navigate the complex world of cybersecurity with confidence. He actively promotes cutting-edge cybersecurity practices and is a trusted voice in the field for both professionals and organizations.

VIEW MY CHANNEL

Segment 11 - The Necessity of Network Security

Segment 12 - Basic Security Measures for Data Protection

Segment 13 - Security Protocols and Their Significance

Segment 08 - Introduction to Networking Protocols

Segment 09 - Dissecting the TCP-IP Model

Segment 10 - Protocol Suites and Their Purposes

Segment 14 - Introduction to Module 2

Segment 15 - Firewall Technologies

Segment 16 - Authentication Protocols

Segment 17 - Virtual Private Networks

Segment 18 - Definition and Concepts  

Segment 19 - Virtual LAN (VXLAN) 

Segment 20 - Network Functions Virtualization (NFV)

Segment 32 - Introduction to network monitoring tools (e.g., Wireshark, SNMP, NetFlow)

Segment 33 - Role of Network Management Systems (NMS) in proactively monitoring network health

Segment 34 - Utilization of log files and alerts for identifying and troubleshooting network issues

Segment 05 - The Geometry of Networks: Analyzing Topologies

Segment 06 - The Pros and Cons of Various Network Topologies

Segment 07 - Scenario: Based Topology Selection

Segment 35 - Introduction to Module 4

Segment 36 - Exploring the role of networks in the IoT ecosystem

Segment 37 - Challenges and solutions for managing the massive influx of IoT devices

Segment 38 - Security considerations in network design for IoT

Segment 24 - Introduction to Module 3

Segment 25 - Comparison of dynamic and static routing protocols

Segment 26 - Evaluation of common routing protocols (e.g., OSPF, EIGRP, BGP) based on scalability and complexity

Segment 27 - Selection criteria for choosing the most appropriate routing protocol

Segment 21 - Cloud Service Models 

Segment 22 - Cloud Deployment Models

Segment 23 - Network Considerations in Cloud Environments

Segment 39 - Definition and significance of edge computing in network architectures

Segment 40 - Implications of edge computing on reducing latency and enhancing performance

Segment 41 - Use cases and deployment scenarios for edge computing in networks

Segment 28 - Importance of QoS in network design for optimizing bandwidth usage

Segment 30 - Configuration of QoS parameters to prioritize specific types of network traffic

Segment 31 - Impact of QoS on application performance and enduser experience

Segment 42 - Integration of AI and ML algorithms for network optimization

Segment 43 - Automation of network management tasks using intelligent algorithms

Segment 44 - Security considerations in network design for IoT

Segment 45 - Conclusion