starweaver-logo
LOG INGET STARTED
LOG INGET STARTED
  • Browse
  • Doing

  • On Air
  • Channels
  • Career Paths
  • LEARNING

  • Courses
  • Certifications
  • Journeys
  • Test Prep
  • CONNECTING

  • How It Works
  • Community
  • Techbytes
  • Podcasts
  • Leaderboards
  • SUPPORT

  • Support & FAQs
  • Starweaver for Business
  • Starweaver for Campus
  • Teach with Starweaver
footer-brand-logo
  • COMPANY
  • About Us
  • Support and Knowledge Base
  • Policies & Terms
  • Contact
  • CONTENT
  • Courses
  • Certifications
  • Journeys
  • Test Prep
  • Meet the Gurus
  • Techbytes
  • FOR ORGANIZATIONS
  • Starweaver for Business
  • Starweaver for Campus
  • Catalogue
  • Pricing
  • Private Classes
  • PARTNER WITH US
  • Instructors & Teachers
  • Books, Writing & Publishing
  • FOLLOW US
    • facebook
    • twitter
    • linkedin
    • pinterest
    • instagram
    • youtube
Our trademarks include Starweaver®, Make genius happen™, Education you can bank on®, People are your most important assets!®, Body of Knowledge™, StarLabs™, LiveLabs™, Journeys™
© Starweaver Group, Inc. All Rights Reserved.
  1. Courses
  2. >
  3. Understanding and Navigating Network Security: From A-Z

Understanding and Navigating Network Security: From A-Z

This course introduces computer networks security technologies and tools for network admins and cybersecurity officers and makes you fully aware of the wired and wireless computer network's basics, devices, and protocols at a step-by-step pace.

Mohammad Adly
Mohammad Adly
Cybersecurity | core | 8 hours |   Published: Nov 2021
In partnership with:  Coursera

    Discussions

Overview

1.2KSTUDENTS*
94%RECOMMEND*

This course includes:

  • 8+ hours of on-demand video
  • 10 modules
  • Core level
  • Direct access/chat with the instructor
  • 100% self-paced online
  • Many downloadable resources
  • Shareable certificate of completion
By the end of this course, you will be fully aware of the wired and wireless computer networks basics, devices, and protocols at a step-by-step pace. You will also reach the professional level in networks security in terms of concepts, technologies, and tools. The course requires no background or pre-requisite, yet you will be able to understand all the up-to-date terminologies in the security of the network during the lectures. 

Skills You Will Gain

IP
Network Security
TCP

Learning Outcomes (At the end of this program you will be able to)

  • Introduction to Computer Networks 
  • ISO/OSI Model (7 Layers) 
  • TCP/IP Protocol Suite 
  • Wireless Networks 
  • Computer Networks Security 
  • Firewalls and Honeypots 
  • Intrusion Detection and Prevention systems (IDS/IPS) 
  • Wireless Networks Security 
  • Physical Security & Incident Handling 
  • Computer Networks Security Recommendations 

Prerequisites

  • Basic computer knowledge 
  • Basic Internet skills and adequate connection 
  • Beginner networking background 
  • Microsoft Windows machine 
  • Microsoft PowerPoint for the presentation material 
  • Beginner cyber security information 

Who Should Attend

  • Network administrators 
  • Cyber security officers 
  • Computer science undergraduates 
  • Computer engineering undergraduates 
  • Network security postgraduates 
  • Network technical support specialists 
  • Security incident handlers 
  • IT Engineers and CEOs 
  • Software Developers 
  • Web Developers 
  • Mobile Applications Developers 

Curriculum

Instructors

Frequently Asked Questions

How much do the courses at Starweaver cost?

We offer flexible payment options to make learning accessible for everyone. With our Pay-As-You-Go plan, you can pay for each course individually. Alternatively, our Subscription-Based plan provides you with unlimited access to all courses for a monthly or yearly fee.

Do you offer any certifications upon completion of a course at Starweaver?

Yes, we do offer a certification upon completion of our course to showcase your newly acquired skills and expertise.

Does Starweaver offer any free courses or trials?

No, we don't offer any free courses, but we do offer 5-day trial only on our subscriptions-based plans.

Are Starweaver's courses designed for beginners or advanced students?

Our course is designed with three levels to cater to your learning needs - Core, Intermediate, and Advanced. You can choose the level that best suits your knowledge and skillset to enhance your learning experience.

What payment options are available for Starweaver courses?

We accept various payment methods such as major credit cards, PayPal, wire transfer, and company purchase orders. For more information related to payments contact customer support.

Do you offer refunds?

Yes, we do offer a 100% refund guarantee for our courses within a specified time frame. If you are not satisfied with the course, contact our customer support team to request a refund with your order details. Some restrictions may apply.

*Where courses have been offered multiple times, the “# Students” includes all students who have enrolled. The “%Recommended” shown is also based on this data.
1Welcome to the course!
2Module 01: Introduction to Computer Networks
3Module 02: ISO/OSI Model (7 Layers)
4Module 03: TCP/IP Protocol Suite
5Module 04: Wireless Networks
6Module 05: Computer Networks Security
7Module 06: Firewalls and Honeypots
8Module 07: Intrusion Detection and Prevention Systems (IDS/IPS)
9Module 08: Wireless Networks Security
10Module 09: Physical Security and Incident Handling
11Module 10: Computer Networks Security Conclusion

Segment - 36 - Wired Equivalent Privacy WEP Attacking

Segment - 37 - WPA and AES Protocols

Segment - 38 - Wireless Security Misconceptions

Segment - 39 - Wireless Attacks and Mitigation

Segment - 40 - Secure Network Design with Wireless

Mohammad Adly

Mohammad Adly

Mohammad Adly is a distinguished expert in computer engineering and electronic sciences, holding a Ph.D. focused on enhancing congestion control mechanisms for internet media traffic. His doctoral research at Menoufiya University introduced advanced methodologies aimed at optimizing network performance for media applications, making significant contributions to the field of network traffic management. He also earned an M.Sc. from the same institution, where his thesis centered on video services for remote work within IP environments, showcasing his deep expertise in video communication technologies.

His strong academic foundation in computer networks was further reinforced through an Information Technology Diploma from the Information Technology Institute (ITI), followed by research experience at the IRISA Institute, Rennes I University in France. There, he explored innovative solutions in network security and performance, gaining valuable international research exposure.

Mohammad holds several prestigious certifications, including the Lean Six Sigma Green Belt and multiple GIAC security certifications. He has contributed extensively to the academic community through numerous publications covering topics such as TCP-friendly rate control, media traffic congestion control, and adaptive video streaming systems. His work has been featured in leading journals and international conferences, reflecting his dedication to advancing technology and its real-world applications.

VIEW MY CHANNEL

Segment - 06 - Why ISO/OSI Model?

Segment - 07 - Application, Presentation, and Session Layers

Segment - 08 - Transport and Network Layers

Segment - 09 - Data Link and Physical Layers

Segment - 10 - ISO/OSI Model in Action

Segment - 01 - What is a Computer Network?

Segment - 02 - Computer Networks Topologies

Segment - 03 - Computer Networks Categories

Segment - 04 - Computer Networks Devices and Services

Segment - 05 - Computer Networks Transmission Media

Segment - 11 - Introduction to Computer Networks Protocols

Segment - 12 - IP Protocol

Segment - 13 - TCP and UDP Protocols

Segment - 14 - Application Protocols

Segment - 15 - TCP/IP Characteristics and Tools

Segment - 31 - What is Intrusion Detection Systems (IDS)?

Segment - 32 - Network IDS (NIDS)

Segment - 33 - NIDS Challenges

Segment - 34 - Snort as NIDS

Segment - 35 - Intrusion Prevention Systems (IPS)

About this course: Overview, Learning Outcomes, Who Should Enroll...

Segment - 16 - Wireless Networks Benefits

Segment - 17 - Wireless Networks Types

Segment - 18 - Wireless Networks Protocol (Wi-Fi)

Segment - 19 - Wireless Networks Devices

Segment - 20 - Wireless Networks Drawbacks

Segment - 21 - Security Goals

Segment - 22 - Securing the Network Design

Segment - 23 - TCP/IP Security and Tools

Segment - 24 - Port Scanning and Tools

Segment - 25 - Sniffing and Tools

Segment - 26 - Why Using a Firewall?

Segment - 27 - Firewalls Rules

Segment - 28 - Firewalls Filtering

Segment - 29 - Honeypots

Segment - 30 - Bypassing Firewalls

Segment - 41 - Physical Security Objectives

Segment - 42 - Physical Threats and Mitigation

Segment - 43 - Defense in Depth (DiD)

Segment - 44 - What is an Incident?

Segment - 45 - Incident Handling

Segment - 46 - Confidentiality, Integrity, and Availability (CIA)

Segment - 47 - Assets, Threats, and Vulnerabilities

Segment - 48 - Risks and Network Intrusion

Segment - 49 - Common Attacks

Segment - 50 - Security Recommendations