Beginner
English
Become an expert in the ethical hacking and network security.
Created By
Mohamed Ibrahim
-
Rating
(5) - 1 Reviews
- 148 Students Enrolled
- 06:42 Hours
Course Overview
In this course, you will be able to discover security vulnerabilities across an entire network, by using network hacking techniques and vulnerability scanning.You will be able to architect your network for maximum security and prevent local and remote attacks.
This course will provide you with overall insight about Network Security
Who this course is for:
- Anyone interested in network security .
- For beginners and intermediate Internet users who are interested in security, safety, and privacy.
- For those who want privacy and anonymity online from hackers, corporations and governments.
- Network Analyst, Network Engineers, Network Architects
What you'll learn
- Threat Land Scape
- Modern Network Security
- Application security
- Data Center Security
- Unified Threat Management
- Management and Analytics
Course Curriculum
Total: 50 Lessons
Time: 06:42 Hours
-
Introduction to Threat... 00:11:49
-
Introduction to Threat Landscape 00:11:49
-
Evaluation of Adversar... 00:07:47
-
Evaluation of Adversaries 00:07:47
-
Hacker Tools 00:07:39
-
Hacker Tools 00:07:39
-
Threat Timeline 00:03:00
-
Threat Timeline 00:03:00
-
Anatomy of a Hacking A... 00:03:36
-
Anatomy of a Hacking Attack 00:03:36
-
Intoduction to Modern ... 00:02:00
-
Traditional Firewall... 00:19:14
-
URL Filtering 00:05:12
-
URL Filtering 00:05:12
-
Threat Prevention 00:01:35
-
Threat Prevention 00:01:35
-
Logging 00:02:00
-
Logging 00:02:00
-
Introduction To Applic... 00:19:00
-
Introduction To Application Security 00:19:00
-
Application challenges... 00:18:16
-
Application Layers The... 00:09:00
-
Application Layers The OSI Model 00:09:00
-
Application Vulnerabil... 00:03:27
-
Application Vulnerabilities 00:03:27
-
OWASP 00:17:22
-
OWASP 00:17:22
-
Distributed Denial of ... 00:09:07
-
Distributed Denial of Service [DDoS] 00:09:07
-
Application Security S... 00:02:00
-
Application Security Solutions 00:02:00
-
Application Delivery C... 00:03:46
-
Application Delivery Controllers 00:03:46
-
Application Delivery N... 00:09:15
-
Application Delivery Network 00:09:15
-
ADC Solutions and Beni... 00:25:39
-
ADC Solutions and Benifits Part I 00:25:39
-
Web Application Firewa... 00:17:00
-
Web Application Firewall (WAF) 00:17:00
-
WAFs and PCI DSS Compl... 00:08:00
-
WAFs and PCI DSS Complaince 00:08:00
-
ADC Solutions and Ben... 00:14:42
-
ADC Solutions and Benefits Part II 00:14:42
-
Introduction to Data C... 00:04:49
-
Introduction to Data Center 00:04:49
-
Data Center Evolution 00:08:00
-
Data Center Evolution 00:08:00
-
Market Trends Affectin... 00:12:52
-
Market Trends Affecting Data Centers 00:12:52
-
Infrastructure Integra... 00:01:00
-
Infrastructure Integration 00:01:00
-
Edge and Core Data Cen... 00:07:29
-
Edge and Core Data Center Firewall's 00:07:29
-
Data center Firewall C... 00:01:48
-
Data center Firewall Characteristics 00:01:48
-
Size 00:01:41
-
Size 00:01:41
-
Managed Security Servi... 00:05:47
-
Managed Security Service Provider 00:05:47
-
Cloud Service 00:03:00
-
Cloud Service 00:03:00
-
The Foundation of Data... 00:10:00
-
Virtual Firewalls 00:06:23
-
Virtual Firewalls 00:06:23
-
Data Center Network Se... 00:12:00
-
Data Center Network Services 00:12:00
-
Introduction to Unifie... 00:04:00
-
The key to UTM Consoli... 00:05:00
-
The key to UTM Consolidation 00:05:00
-
UTM Features 00:06:26
-
UTM Features 00:06:26
-
UTM Distributed Enterp... 00:07:00
-
Extended UTM Features 00:11:43
-
Extended UTM Features 00:11:43
-
Evolving UTM Features 00:03:33
-
Evolving UTM Features 00:03:33
-
UTM Functions 00:01:00
-
UTM Functions 00:01:00
-
Where UTM is Fits In 00:00:55
-
Where UTM is Fits In 00:00:55
-
UTM Scalable Developme... 00:01:28
-
UTM Scalable Development 00:01:28
-
Management and Analyti... 00:04:58
-
Management and Analytics 00:04:58
-
Security Management 00:23:13
-
Security Management 00:23:13
-
Managing the Security ... 00:09:10
-
Managing the Security Console 00:09:10
-
Policy and Security 00:16:48
-
Policy and Security 00:16:48
-
Analytics 00:11:00
-
Analytics 00:11:00
-
Network Visibility 00:01:12
-
Network Visibility 00:01:12
Item Reviews - 1
Submit Reviews
This Course Include:
- 06:42 Hours On-Demand Videos
- 50 Lessons
- Lifetime Access
- Access on Mobile and TV
- Certificate of Completion
Khaja sheriff 20 Jun, 2020
" Very Good Course. Each concept well explained in detail. Looking forward to the next course in this learning path "