Network Security

Course

Online

£ 10 + VAT

Description

  • Type

    Course

  • Methodology

    Online

  • Start date

    Different dates available

Learn network security attacks and defensive techniques to secure Networks from known and unknown sources.Network security is any activity designed to protect the usability and integrity of your network and data. It includes both hardware and software technologies. Effective network security manages access to the network. It targets a variety of threats and stops them from entering or spreading on your network. The video tutorial starts with the basics of network and scanning techniques. You will learn to search hosts and find open ports and services in a network. You will also learn the most important attacks on networks such as dos attacks, gaining access attacks, exploitation attacks, and post exploitation attacks. Finally, the course will teach you techniques you can use to defend networks with firewalls, IDS, IPS, and other network security devices. At the end of this course, you’ll have a practical knowledge of the ways in which hackers can infiltrate a network over the Internet and will be familiar with tools such as nmap, Wireshark, and MetasploitAbout The AuthorSunil K. Gupta is a Computer Science Engineer as well as a web and network Security Specialist working in the field of Cyber Security . In cyber Industry we work on different hacking tools and techniques.His strengths are:-Vulnerability assessment
Penetration testing
Wi-Fi assessment
Intrusion detection
Risk identification
Data analysis
Reports and briefingThe best security tools he has used are:Class-Dump-Z, Cycript, GNU Debugger, Fiddler, Nmap, Wikto, Brutus, Wireshark, Burp Proxy, Paros Proxy, Cain and Abel, John the Ripper, Hydra, Metasploit, netcat, openssl, ike tools, Back track tools, Nessus, IBM-AppScan, Acunetix, Nikto, NetSparker, Microsoft Baseline Security Analyzer (MBSA), Web Securify, Nipper.Platforms - Windows, Linux

Facilities

Location

Start date

Online

Start date

Different dates availableEnrolment now open

About this course

Nmap and port scanning to discover hosts and services on a computer network
Metasploit and exploitation to verify vulnerability mitigations and manage security
Windows- and Linux-specific vulnerabilities
Network sniffing to monitor data flowing over computer network links in real time
Defend common misconfigurations to protect potentially sensitive system information
Pivot into a network in order to exploit and gain access to as many machines
Maintaining access once a target is breached

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Reviews

This centre's achievements

2021

All courses are up to date

The average rating is higher than 3.7

More than 50 reviews in the last 12 months

This centre has featured on Emagister for 4 years

Subjects

  • Network Training
  • Web
  • Printing
  • Installation
  • Network security
  • Proxy
  • Network
  • Linux
  • Networks
  • Windows
  • Access

Course programme

Introducing Network Security 5 lectures 30:00 The Course Overview This video will give you an overview about the course. Overview of Network Security In this video, we will find various goals of network security. • List goals of network security • Explain network goals • Explain Network security Discussion of the Different Types of Vulnerabilities in Networks In this video, we will be listing major and minor vulnerabilities. • Learn about vulnerabilities in network • List vulnerabilities • Explain vulnerabilities like missing patches , default passwords Network Vulnerability Test Scope and Process In this video, we will look at Test Scope, and Process of VA. • List test scopes • Explain test scopes • Explain about process of Vulnerability Assessment Installation of Virtual Machines In this video, we will look at the process of Installation. • VMware Installation • Kali Linux Installation • Windows Installation Introducing Network Security- Quiz Introducing Network Security 5 lectures 30:00 The Course Overview This video will give you an overview about the course. Overview of Network Security In this video, we will find various goals of network security. • List goals of network security • Explain network goals • Explain Network security Discussion of the Different Types of Vulnerabilities in Networks In this video, we will be listing major and minor vulnerabilities. • Learn about vulnerabilities in network • List vulnerabilities • Explain vulnerabilities like missing patches , default passwords Network Vulnerability Test Scope and Process In this video, we will look at Test Scope, and Process of VA. • List test scopes • Explain test scopes • Explain about process of Vulnerability Assessment Installation of Virtual Machines In this video, we will look at the process of Installation. • VMware Installation • Kali Linux Installation • Windows Installation Introducing Network Security- Quiz The Course Overview This video will give you an overview about the course. The Course Overview This video will give you an overview about the course. The Course Overview This video will give you an overview about the course. The Course Overview This video will give you an overview about the course. This video will give you an overview about the course. This video will give you an overview about the course. Overview of Network Security In this video, we will find various goals of network security. • List goals of network security • Explain network goals • Explain Network security Overview of Network Security In this video, we will find various goals of network security. • List goals of network security • Explain network goals • Explain Network security Overview of Network Security In this video, we will find various goals of network security. • List goals of network security • Explain network goals • Explain Network security Overview of Network Security In this video, we will find various goals of network security. • List goals of network security • Explain network goals • Explain Network security In this video, we will find various goals of network security. • List goals of network security • Explain network goals • Explain Network security In this video, we will find various goals of network security. • List goals of network security • Explain network goals • Explain Network security Discussion of the Different Types of Vulnerabilities in Networks In this video, we will be listing major and minor vulnerabilities. • Learn about vulnerabilities in network • List vulnerabilities • Explain vulnerabilities like missing patches , default passwords Discussion of the Different Types of Vulnerabilities in Networks In this video, we will be listing major and minor vulnerabilities. • Learn about vulnerabilities in network • List vulnerabilities • Explain vulnerabilities like missing patches , default passwords Discussion of the Different Types of Vulnerabilities in Networks In this video, we will be listing major and minor vulnerabilities. • Learn about vulnerabilities in network • List vulnerabilities • Explain vulnerabilities like missing patches , default passwords Discussion of the Different Types of Vulnerabilities in Networks In this video, we will be listing major and minor vulnerabilities. • Learn about vulnerabilities in network • List vulnerabilities • Explain vulnerabilities like missing patches , default passwords In this video, we will be listing major and minor vulnerabilities. • Learn about vulnerabilities in network • List vulnerabilities • Explain vulnerabilities like missing patches , default passwords In this video, we will be listing major and minor vulnerabilities. • Learn about vulnerabilities in network • List vulnerabilities • Explain vulnerabilities like missing patches , default passwords Network Vulnerability Test Scope and Process In this video, we will look at Test Scope, and Process of VA. • List test scopes • Explain test scopes • Explain about process of Vulnerability Assessment Network Vulnerability Test Scope and Process In this video, we will look at Test Scope, and Process of VA. • List test scopes • Explain test scopes • Explain about process of Vulnerability Assessment Network Vulnerability Test Scope and Process In this video, we will look at Test Scope, and Process of VA. • List test scopes • Explain test scopes • Explain about process of Vulnerability Assessment Network Vulnerability Test Scope and Process In this video, we will look at Test Scope, and Process of VA. • List test scopes • Explain test scopes • Explain about process of Vulnerability Assessment In this video, we will look at Test Scope, and Process of VA. • List test scopes • Explain test scopes • Explain about process of Vulnerability Assessment In this video, we will look at Test Scope, and Process of VA. • List test scopes • Explain test scopes • Explain about process of Vulnerability Assessment Installation of Virtual Machines In this video, we will look at the process of Installation. • VMware Installation • Kali Linux Installation • Windows Installation Installation of Virtual Machines In this video, we will look at the process of Installation. • VMware Installation • Kali Linux Installation • Windows Installation Installation of Virtual Machines In this video, we will look at the process of Installation. • VMware Installation • Kali Linux Installation • Windows Installation Installation of Virtual Machines In this video, we will look at the process of Installation. • VMware Installation • Kali Linux Installation • Windows Installation In this video, we will look at the process of Installation. • VMware Installation • Kali Linux Installation • Windows Installation In this video, we will look at the process of Installation. • VMware Installation • Kali Linux Installation • Windows Installation Introducing Network Security- Quiz Introducing Network Security- Quiz Introducing Network Security- Quiz Introducing Network Security- Quiz Network Scanning and Information Gathering 4 lectures 40:27 Various Network Footprinting Techniques In this video, we will be listing various Foot printing techniques. • Explain foot printing • List tools • Run Port scan using nmap Securing Networks by Detecting Footprinting In this video, we will look at detection of foot printing. • Define detection • Explore tools for detection • Use of packet analyzer Scanning Techniques of Networks In this video, we will be listing various Scanning tools. • Explanation about Scanning • List tools • Run port scan using Nessus Securing Networks Techniques Against Scanning In this video, we will look at Detection of Scanning. • Defining Scanning detection • List tools • Explain use of packet analyzer Network Scanning and Information Gathering- Quiz Network Scanning and Information Gathering. 4 lectures 40:27 Various Network Footprinting Techniques In this video, we will be listing various Foot printing techniques. • Explain foot printing • List tools • Run Port scan using nmap Securing Networks by Detecting Footprinting In this video, we will look at detection of foot printing. • Define detection • Explore tools for detection • Use of packet analyzer Scanning Techniques of Networks In this video, we will be listing various Scanning tools. • Explanation about Scanning • List tools • Run port scan using Nessus Securing Networks Techniques Against Scanning In this video, we will look at Detection of Scanning. • Defining Scanning detection • List tools • Explain use of packet analyzer Network Scanning and Information Gathering- Quiz Various Network Footprinting Techniques In this video, we will be listing various Foot printing techniques. • Explain foot printing • List tools • Run Port scan using nmap Various Network Footprinting Techniques In this video, we will be listing various Foot printing techniques. • Explain foot printing • List tools • Run Port scan using nmap Various Network Footprinting Techniques In this video, we will be listing various Foot printing techniques. • Explain foot printing • List tools • Run Port scan using nmap Various Network Footprinting Techniques In this video, we will be listing various Foot printing techniques. • Explain foot printing • List tools • Run Port scan using nmap In this video, we will be listing various Foot printing techniques. • Explain foot printing • List tools • Run Port scan using nmap In this video, we will be listing various Foot printing techniques. • Explain foot printing • List tools • Run Port scan using nmap Securing Networks by Detecting Footprinting In this video, we will look at detection of foot printing. • Define detection • Explore tools for detection • Use of packet analyzer Securing Networks by Detecting Footprinting In this video, we will look at detection of foot printing. • Define detection • Explore tools for detection • Use of packet analyzer Securing Networks by Detecting Footprinting In this video, we will look at detection of foot printing. • Define detection • Explore tools for detection • Use of packet analyzer Securing Networks by Detecting Footprinting In this video, we will look at detection of foot printing. • Define detection • Explore tools for detection • Use of packet analyzer In this video, we will look at detection of foot printing. • Define detection • Explore tools for detection • Use of packet analyzer In this video, we will look at detection of foot printing. • Define detection • Explore tools for detection • Use of packet analyzer Scanning Techniques of Networks In this video, we will be listing various Scanning tools. • Explanation about Scanning • List tools • Run port scan using Nessus Scanning Techniques of Networks In this video, we will be listing various Scanning tools. • Explanation about Scanning • List tools • Run port scan using Nessus Scanning Techniques of Networks In this video, we will be listing various Scanning tools. • Explanation about Scanning • List tools • Run port scan using Nessus Scanning Techniques of Networks In this video, we will be listing various Scanning tools. • Explanation about Scanning • List tools • Run port scan using Nessus In this video, we will be listing various Scanning tools. • Explanation about Scanning • List tools • Run port scan using Nessus In this video, we will be listing various Scanning tools Attacks on Networks- Quiz ...

Additional information

Network security Knowledge

Network Security

£ 10 + VAT