Companies Home Search Profile

Complete Cyber Security Course: The Network Security A-Z™

Focused View

Teach Apex

15:17:22

56 View
  • 1. Introduction.mp4
    02:49
  • 2. Video 3 Different Types of Networks.mp4
    13:49
  • 3. Video 4 Network Components.mp4
    14:23
  • 4. Video 2 OSI & TCPIP Network Models.mp4
    14:10
  • 5. Lab1 Find MAC Address & how to Spoof it.mp4
    10:13
  • 6. Video 5 Networking Protocols in TCPIP Protocol Stack (1).mp4
    17:53
  • 7. Video 6 Networking Protocols in TCPIP Protocol Stack (2).mp4
    11:40
  • 8. Video 7 IP Addressing Concepts.mp4
    12:18
  • 9. Lab2 Find IP Addresses and Spoof Private IP Address Manually.mp4
    07:50
  • 10.1 Network Security Module 1.zip
  • 10. Lab3 Spoof Public IP Address Manually.mp4
    04:51
  • 1. Video 8 Network Design Elements and Components Part 1.mp4
    08:18
  • 2. Video 9 Network Design Elements and Components Part 2.mp4
    16:19
  • 3. Video 10 Network Design Elements and Components Part 3.mp4
    15:07
  • 4. Video 11 Network Design Elements and Components Part 4.mp4
    13:42
  • 5.1 Network Security Module 2.zip
  • 5. Video 11 Network Design Elements and Components Part 4.mp4
    13:42
  • 1. Video 12 Essential Terminologies.mp4
    23:31
  • 2. Video 13 Network Security Concerns.mp4
    06:30
  • 3. Video 14 Network Security Threats & Attacks.mp4
    04:57
  • 4. Video 15 Passive Network Attacks.mp4
    12:30
  • 5. Video 16 Active Network Attacks.mp4
    25:01
  • 6. Lab4 Create a Virus using JPS Virus Maker.mp4
    09:23
  • 7. Lab5 Create HTTP Trojan using HTTP RAT.mp4
    06:43
  • 8. Lab6 How to use Spytech SpyAgent for System Monitoring & Surveillance.mp4
    16:18
  • 9. Lab7 Use Keyloggers to Capture Key Logs.mp4
    10:39
  • 10. Lab8 Perform DoS Attack using LOIC.mp4
    07:16
  • 11. Lab9 Perform DoS Attack using HOIC.mp4
    07:23
  • 12. Lab10 HTTP Flooding using DoSHttp.mp4
    09:01
  • 13. Video 17 Password Based Attacks.mp4
    06:00
  • 14. Lab11 How HackersAttackers use Default Passwords.mp4
    06:00
  • 15. Lab12 CrackingAuditing Windows Passwords using L0phtCrack.mp4
    13:09
  • 16. Video 18 Network Security Vulnerabilities.mp4
    07:05
  • 17.1 Network Security Module 3.zip
  • 17. Lab13 How to use Account Lockout Policy in Windows.mp4
    05:27
  • 1. Video 19 Elements of Network Security.mp4
    11:09
  • 2. Video 20 IAAA.mp4
    07:51
  • 3. Video 21 Cryptography.mp4
    10:09
  • 4. Lab14 Data Encryption & Decryption using Advanced Encryption Package.mp4
    10:41
  • 5. Lab15 Dump & Crack SAM Hashes.mp4
    09:40
  • 6. Lab16 Steganography using OpenStego.mp4
    07:53
  • 7. Video 22 Network Security Policies.mp4
    05:45
  • 8. Video 23 Network Security Devices & Other Technologies.mp4
    11:40
  • 9. Lab17 Configure TOR Web Browser for Proxy Network.mp4
    11:09
  • 10.1 Network Security Module 4.zip
  • 10. Lab18 How to work with PRTG Protocol Analyzer.mp4
    12:58
  • 1. Video 24 Introduction to Intrusion Detection System.mp4
    04:27
  • 2. Video 25 Network Intrusions & IDS.mp4
    09:06
  • 3. Video 26 How IDS Works & Components.mp4
    05:08
  • 4. Video 27 IDS Types.mp4
    10:31
  • 5. Video 28 IPS & its Technologies.mp4
    10:06
  • 6. Video 29 IDS-IPS Solutions.mp4
    08:14
  • 7.1 Network Security Module 5.zip
  • 7. Lab19 Detecting Intrusions using SNORT.mp4
    15:11
  • 1. Video 30 Firewalls and What it does.mp4
    08:07
  • 2. Video 31 How Does a Firewall Work.mp4
    07:24
  • 3. Lab20 Turn On or Off Windows Firewall.mp4
    04:07
  • 4. Lab21 Allow an App through Windows Firewall.mp4
    08:28
  • 5. Lab22 Create Inbound and Outbound Windows Firewall Rules.mp4
    15:46
  • 6. Video 32 Firewalls Generations & Types - Part 1.mp4
    11:49
  • 7. Video 33 Firewalls Generations & Types - Part 2.mp4
    05:58
  • 8. Video 34 Firewall Limitations.mp4
    07:58
  • 9. Video 35 Firewall Threats & Vulnerabilities.mp4
    08:35
  • 10.1 Network Security Module 6.zip
  • 10. Video 36 Firewall Security Recommendations and Best Practices.mp4
    06:18
  • 1. Video 37 Introduction to Wireless Network Security.mp4
    05:58
  • 2. Video 38 Wireless Networks.mp4
    07:47
  • 3. Video 39 Wireless Network Standards.mp4
    06:59
  • 4. Video 40 Wi-Fi Threats & Vulnerabilities.mp4
    16:55
  • 5. Video 41 Wireless Network Security Standards.mp4
    08:40
  • 6. Video 42 Wireless Security Testing.mp4
    06:52
  • 7. Lab23 Cracking WPAWPA2 Wireless Network using Aircrack-ng.mp4
    11:16
  • 8.1 Network Security Module 7.zip
  • 8. Video 43 Wireless Secure Configuration and Network Isolation.mp4
    04:43
  • 1. Video 44 Sniffing Concepts.mp4
    14:46
  • 2. Video 45 Types of Sniffing.mp4
    09:29
  • 3. Video 46 Sniffing Network Traffic.mp4
    06:10
  • 4. Lab24 Sniffing Wireless Traffic using Omni Peek Network Analyzer.mp4
    13:25
  • 5. Lab25 Sniffing the Network using TCPDump.mp4
    06:56
  • 6. Lab26 Sniffing the Network using WinDump.mp4
    14:39
  • 7. Video 47 Packet hunting with Wireshark.mp4
    01:55
  • 8. Lab27 Sniffing Network Packets to capture User Credentials using Wireshark.mp4
    12:33
  • 9.1 Network Security Module 8.zip
  • 9. Video 48 Spoofing Concepts.mp4
    09:46
  • 1. Video 49 Network Traffic Monitoring.mp4
    08:46
  • 2. Video 50 Network Traffic Analysis.mp4
    03:58
  • 3. Lab28 Network Traffic Analysis using TCPDump.mp4
    08:09
  • 4.1 Network Security Module 9.zip
  • 4. Lab29 Network Traffic Analysis using Wireshark.mp4
    17:31
  • 1. Video 51 Network Scanning basics.mp4
    20:26
  • 2. Lab30 Creating Custom Packet using Colasoft Packet Builder.mp4
    11:17
  • 3. Video 52 Check for Live Systems by using Ping, Ping Sweep.mp4
    05:16
  • 4. Lab31 Check for Live Systems using Nmap.mp4
    05:49
  • 5. Video 53 Check for Open and Closed Ports using Nmap.mp4
    10:04
  • 6. Lab32 Check for Open and Closed Ports using Nmap.mp4
    11:03
  • 7. Video 54 Nmap Scan Techniques - Part 1.mp4
    11:59
  • 8. Video 55 Nmap Scan Techniques - Part 2.mp4
    03:50
  • 9. Lab33 Exploring various Network Scanning Techniques.mp4
    05:37
  • 10. Video 56 Nmap Scripting Engine (NSE).mp4
    06:07
  • 11. Lab34 Work with Nmap Scripting Engine (NSE).mp4
    08:12
  • 12. Video 57 Vulnerability Scanning.mp4
    04:19
  • 13. Lab35 Banner Grabbing using Nmap.mp4
    04:03
  • 14.1 Network Security Module 10.zip
  • 14. Lab36 Network Vulnerability Scanning using NSAuditor.mp4
    12:02
  • Description


    Cyber Security In-depth - Network Security Fundamentals (Threat, Vulnerabilities), NMAP, Firewalls & Prevent Attacks

    What You'll Learn?


    • Network Fundamentals
    • Network Design Elements and Components
    • Network Security Threats, Vulnerabilities, and Attacks
    • Network Security Controls, Devices and Protocols
    • Introduction to Intrusion Detection System
    • Introduction to Firewalls
    • Introduction to Wireless Network Security
    • Sniffing and Spoofing
    • Network Traffic Monitoring & Analysis
    • Network Scanning

    Who is this for?


  • Any internet user who wants to become an expert in security, privacy, and anonymity.
  • For all levels of internet users who are interested in security, safety, and privacy.
  • This course is for anyone who wants to keep their important files, emails, accounts and personal information out of the hackers.
  • This course is for anyone who wants to become an expert in network security, privacy, and anonymity. This course covers network security attacking and defending techniques.
  • This course is specially designed for the personnel who would love to gain a practical skillset in mitigating the network security attacks such as - Virus, Trojans, Spywares, Keyloggers, DoS/DDoS, Password based attacks etc. by implementing Firewalls/IDS/IPS solutions and implementing a complete Network Vulnerability Assessment plan.
  • This course is ideal for Network Security leaders responsible for applying best practices to secure Network, including those in the following positions: Network Security Administrator, Network Security Auditors, Security Consultant, Security Architect
  • For anyone who would love to gain a practical skillset in mitigating the risk from, malware, Trojans, hackers, trackers, cyber criminals and all online threats.
  • This course is designed for personal and home Internet security, privacy, and anonymity.
  • What You Need to Know?


  • You should have a basic understanding of computing concepts
  • Please have a look at the curriculum
  • More details


    Description

    Become a Network Security Specialist with this exclusive course covering every aspect of Network Security. After this course, you will be able to discover security vulnerabilities across an entire network, by using network hacking techniques and vulnerability scanning.

    You will be able to architect your network for maximum security and prevent local and remote attacks. You will understand the various types of firewalls that are available and what threats each helps mitigate.

    Explore wireless security, the configurations that are required for maximum security, and why. Learn how Wi-Fi is hacked and how to mitigate those attacks, covering topics from Wireless encryption weaknesses and the latest WPA3 standard.

    You will master network monitoring to discover and identify potential hackers, malware, and other adversaries that might be lurking on your network. Using tools like Wireshark and Nmap.

    Learn the best ways to reduce the attack surface of your network and harden it for maximum security and privacy. Finally, you will fully understand how to best use IDS and IPS in your network to secure your network.

    This Network Security training can be used as a security solution for home-based or any business-sized networks, which makes it an ideal solution for securing networking activities.

    After going through this course, you will find yourself at an intermediate level of knowledge regarding network security.

    Who this course is for:

    • Any internet user who wants to become an expert in security, privacy, and anonymity.
    • For all levels of internet users who are interested in security, safety, and privacy.
    • This course is for anyone who wants to keep their important files, emails, accounts and personal information out of the hackers.
    • This course is for anyone who wants to become an expert in network security, privacy, and anonymity. This course covers network security attacking and defending techniques.
    • This course is specially designed for the personnel who would love to gain a practical skillset in mitigating the network security attacks such as - Virus, Trojans, Spywares, Keyloggers, DoS/DDoS, Password based attacks etc. by implementing Firewalls/IDS/IPS solutions and implementing a complete Network Vulnerability Assessment plan.
    • This course is ideal for Network Security leaders responsible for applying best practices to secure Network, including those in the following positions: Network Security Administrator, Network Security Auditors, Security Consultant, Security Architect
    • For anyone who would love to gain a practical skillset in mitigating the risk from, malware, Trojans, hackers, trackers, cyber criminals and all online threats.
    • This course is designed for personal and home Internet security, privacy, and anonymity.

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    TeachApex is an online training center that connects hundreds of certified and highly qualified IT professionals and thousands of students under a roof. We are happy to share our knowledge and skills with you and help you to enhance your skill, boost your career (both online and offline) and unlock all the potentialities in you.Our goal is to provide the highest quality in all of our courses at a price which would be affordable for all the aspirants and learners all over the globe.Our motto is: Quality in Education and E-quality in Education.Happy learning. :)
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 94
    • duration 15:17:22
    • English subtitles has
    • Release Date 2023/09/10