• No products in the cart.

Computer Networking and Cyber Security

0( 0 REVIEWS )
9 STUDENTS
course-image

Course Overview

You’ll have an arsenal of skills to lock down your desired career after completing this Computer Networking and Cyber Security course. Moreover, you will have access to all of the materials in this course for free for a whole year and learn a multitude of highly coveted skills to move up the corporate ladder.

With this comprehensive Computer Networking and Cyber Security course, you’ll have all of your questions answered and all of the necessary expertise under your belt. Apart from setting you up for success, this course offers numerous advantages to make your learning experience more pleasurable and less stressful. So, add this Computer Networking and Cyber Security course to the basket and take your expertise up a notch!

Please Note: Thames College is a One Education approved resale partner for Quality Licence Scheme Endorsed courses.

Why Choose Thames College?

Thames College offers you the benefit of —

Who Is This Course For?

Those who want to strengthen their professional skills while training for the desired job should take advantage of the Computer Networking and Cyber Security training! This course will keep you up-to-date with all the latest developments and coach you accordingly. So invest in this Computer Networking and Cyber Security course if you want the best training available.

Certificate of Achievement

CPD Certification

After successfully completing the assessment of this Computer Networking and Cyber Security course, you can apply for the CPD accredited certificates. The PDF version is only £2.99 and the Hardcopy version will cost you £8.99.

Requirements

No formal entry requirements! No prerequisites or relevant experience is required!

This course is accessible to anyone with an eagerness to learn. All you require is—

Career Path

Utilise this all-inclusive course to acquire the skills and expertise you’ll need to thrive in the workplace.

Course Curriculum

Section 01: Introduction to Cyber Security Masterclass Course
Course Introduction 00:04:00
Section 02: Complete Computer Networking for Cybersecurity and Ethical Hacking
What is a Network? 00:04:00
What is a Local Area Network? 00:03:00
Routers and LAN 00:03:00
Network Components 00:07:00
WAN and MPLS 00:06:00
Peer to Peer Network Architecture 00:04:00
Client-Server Network Architecture 00:04:00
Bus and Star Topology 00:06:00
Mesh and Ring Topology 00:05:00
Other Network Topologies that you should know! 00:08:00
Quick Recap 00:03:00
Introduction to Internetworking Models 00:03:00
Layered Approach and Advantages 00:05:00
Introduction to OSI Model 00:06:00
OSI Model: Application Layer 00:04:00
OSI Model: Presentation and Session Layer 00:02:00
OSI Model: Transport Layer 00:02:00
Connection Oriented vs Connectionless Service 00:06:00
What is Flow Control? 00:05:00
What is Windowing? 00:04:00
OSI Model: The Physical Layer 00:04:00
Quick Recap 00:04:00
What’s next? 00:02:00
What is a Coaxial Cable? 00:06:00
What is a Twisted Pair Cable? 00:03:00
What is Fibre Optic Cable? 00:06:00
Media Converters 00:05:00
UTP Categories 00:07:00
Different Wiring Standards 00:05:00
Straight Through Cable Type 00:05:00
Quick Recap 00:03:00
Welcome to Ethernet Specifications 00:02:00
Ethernet Basics 00:04:00
CSMA – CD Contention Method 00:04:00
Broadband – Baseband 00:04:00
Binary – Decimal Conversion 00:06:00
Ethernet Addressing 00:03:00
What are Ethernet Frames? 00:04:00
Ethernet at Physical Layer 00:02:00
IEEE 802.3 00:03:00
Quick Recap 00:01:00
Section 03: Networking Devices
Common Networking Devices 00:03:00
Network Interface Card (NIC) 00:02:00
Hub 00:04:00
Bridge 00:02:00
Switch 00:05:00
Router 00:05:00
Firewalls 00:05:00
IDS IPS HIDS 00:05:00
Access Points 00:03:00
Wireless Range Extenders 00:02:00
CSMA CA Introduction 00:04:00
CSMA CA Working 00:04:00
CSMA CD Introduction 00:02:00
CSMA CD Working 00:03:00
Introduction to DHCP Server 00:04:00
DHCP Operations 00:05:00
Introduction to Other devices 00:01:00
Multilayer Switch and Load Balancer 00:04:00
Introduction to DNS Server 00:05:00
DNS Record types 00:07:00
Types of DNS Servers 00:03:00
Proxy Servers 00:05:00
Encryption Devices 00:03:00
Analog Modems, Packet Shaper and VPN Concentrator 00:04:00
Media Converters and Next Generation Firewalls 00:02:00
Benefits of Routers 00:02:00
Quick Recap 00:04:00
Section 04: Getting Started with Cybersecurity!
What is Security? 00:06:00
What is Cybersecurity? 00:05:00
History of Cybersecurity 00:07:00
How to start a career in Cybersecurity? 00:06:00
Different Careers in Cybersecurity 00:10:00
Key Terms in Cyber Security 00:06:00
Elements of Information Security 00:07:00
Section 05: Fundamentals of Cybersecurity
Types of Actors 00:09:00
Passive Attacks in Cybersecurity 00:05:00
Active Attacks in Cybersecurity 00:05:00
Security Organizations 00:05:00
Section 06: Key Security Concepts
Security Architect’s View of Cybersecurity 00:06:00
Security Services and Mechanisms 00:06:00
Security Attacks! 00:07:00
Section 07: Cryptography - Securing your Data
What is Cryptography? 00:05:00
What is Symmetric Encryption? 00:03:00
AES and DES Standards in Cryptography 00:06:00
Asymmetric Encryption 00:03:00
Hashing 00:07:00
PKI and CA 00:10:00
RSA and Diffie Hellman Algorithms 00:07:00
What are Digital Signatures? 00:09:00
Transport Layer Security (TLS) Encryption 00:04:00
Generating Hashes using HashCal 00:04:00
Understanding Encryption and Decryption’ 00:05:00
Section 08: Introduction to Ethical Hacking
Hacking Terms 00:07:00
Vulnerability Assessment and Penetration Testing 00:09:00
Pentesting Methodologies 00:07:00
Types of Penetration Tests 00:06:00
Phases of Penetration Testing 00:04:00
10 Steps SECURITY EXPERTS follow! 00:04:00
Section 09: Setting up your own Penetration Testing Lab
What is Linux Operating System? 00:04:00
Have you heard of Kali Linux? 00:03:00
Installing Virtual Box 00:06:00
Installing KALI Linux in Virtual Box 00:12:00
Installing Metasploitable Machine in Virtual Box 00:09:00
Installing Damn Vulnerable Web Application (DVWA) in KALI Linux 00:18:00
Installing TOR Browser 00:09:00
Executing Linux Commands – Part 1 00:12:00
Executing Linux Commands – Part 2 00:14:00
Section 10: Information Gathering - Reconnaissance
What is Information Gathering? 00:08:00
Information Gathering using MALTEGO – Part 1 00:07:00
Information Gathering using MALTEGO – Part 2 00:06:00
Information Gathering using HTTRACK 00:05:00
Information Gathering using THE HARVESTER 00:02:00
Information Gathering using OSINT Framework 00:05:00
Information Gathering using NSLOOKUP 00:03:00
Information Gathering using REDHAWK 00:05:00
Information Gathering using SHODAN 00:09:00
Section 11: Scanning and Enumeration
What is Scanning? 00:07:00
What is NMAP Tool? 00:05:00
How to use Zenmap GUI? 00:17:00
What is Enumeration? 00:03:00
Types of Enumeration 00:03:00
Enumeration using Super Scan Tool 00:07:00
Enumeration Using Hyena Tool 00:06:00
Section 12: Vulnerability Assessment and Penetration Testing
What is Vulnerability Assessment? 00:04:00
Phases of Vulnerability Assessment 00:08:00
What are Vulnerability Scoring Systems? 00:09:00
Introduction to Nessus Tool 00:05:00
Create and Configure Network Scan using Nessus 00:08:00
Launching a Scan in Nessus Tool 00:08:00
Section 13: Firewall
What is an Intrusion Detection System? 00:11:00
What is a Firewall? 00:10:00
What is a Demilitarized Zone (DMZ)? 00:06:00
How to evade Intrusion Detection System? 00:08:00
How to evade Firewall? 00:09:00
Firewall Pentesting 00:02:00
Section 14: Web Application Penetration Testing
Introduction to Web Servers 00:05:00
Web Server Attacks 00:05:00
Web Server Penetration Testing 00:04:00
How to protect web servers from getting hacked? 00:05:00
OWASP Top 10 Vulnerabilities – Part 1 00:05:00
OWASP Top 10 Vulnerabilities – Part 2 00:07:00
Website Footprinting – Part 1 00:05:00
Website Footprinting – Part 2 00:03:00
Exploiting Basic Command Execution Vulnerability 00:06:00
Exploiting Basic Command Execution Vulnerability 00:07:00
How to configure Burp Suite? 00:16:00
Exploiting Basic File Upload Vulnerability 00:10:00
Exploiting Advance File Upload Vulnerability 00:07:00
Exploiting more advance File Upload Vulnerability 00:08:00
What is SQL Injection? 00:04:00
Types of SQL Injections 00:05:00
How to exploit SQL Injection manually? 00:17:00
Automating SQL Injection using SQLMap 00:09:00
How to prevent SQL Injection? 00:03:00
What is Cross Site Scripting (XSS) Vulnerability? 00:03:00
Types of Cross Site Scripting Vulnerability 00:06:00
Exploiting XSS vulnerability – Part 1 00:11:00
Exploiting XSS vulnerability – Part 2 00:05:00
Exploiting XSS vulnerability – Part 3 00:11:00
How to prevent XSS Attacks? 00:04:00
What is Cross Site Request Forgery (CSRF)? 00:06:00
Exploiting Cross Site Request Forgery Vulnerability 00:07:00
What is a Brute Force Attack? 00:05:00
Getting Usernames and Passwords using Brute Forcing 00:18:00
How to carry out a complete Web Application Penetration Test? 00:09:00
How to protect Web Applications? 00:06:00
Section 15: Denial of Service
What is Denial of Service? 00:03:00
Types of DOS Attacks? 00:05:00
What is a Botnet? 00:03:00
Section 16: Malware Threats
What is a Malware? 00:09:00
What are Trojans? 00:08:00
Types of Trojans 00:08:00
Introduction to Virus 00:07:00
Types of Virus 00:10:00
How to prevent against Malware? 00:07:00
Section 17: Social Engineering - The Art of Human Exploitation
What is Social Engineering? 00:05:00
Types of Social Engineering Techniques 00:06:00
Getting user credentials using BEEF – Part 1 00:09:00
Getting user credentials using BEEF – Part 2 00:11:00
Section 18: Writing a Penetration Testing Report
What is a Pentest Report? 00:08:00
Components of a Penetration Test Report 00:14:00
Assignment
Assignment -Computer Networking and Cyber Security 00:00:00

Certificate of Achievement

CPD Accredited Certification

You will be eligible for CPD Accredited Certificates after completing this Course successfully.
Certification is available –
  1. In PDF for £2.99
  2. Hard copy for £8.99
Thames-College-Certificate
Thames-college-logo-white-2021

We are a business that specialises in providing CPD & QLS accredited courses for anyone looking to advance their professional career.

Address : 78 Ilford Lane, Ilford, England, IG1 2LA

Email : info@thamescollege.org

Phone Number : ​020 8124 5465

Useful Links

Payment Methods

lead-payment-logos

Copyright © 2024 Thames College. All Right Reserved.

top