Computer Networks part 3

Wishlist Share
Share Course
Page Link
Share On Social Media

About Course

Computer networks are a growing trend. You can find them at your home, school, work, and most of the places you go daily.

Learn the basic concepts of computer networks, which hardware to use to set them up, and how to secure them.

  • Become aware of networks surrounding you

When you start noticing networks around you, you will also understand a big part of the IT world. You will learn how the Internet works, how your Internet Service Provider (ISP) allows you to connect online, how do people share data without Internet access, and much more. Everything starts by becoming aware of computer networks.

  • Learn how to set up a network

Whether you are taking this course to improve yourself, to get a better grade at school, or because of work, setting up a network is a skill that is very useful today. Yet many people do not know how to do it. You have an opportunity to learn it in few minutes.

  • Learn how to protect yourself in a network, including the Internet

Unwanted sharing of passwords, pictures, documents, credit card numbers, and internet activity is not something anybody would want to share. But, with the expanded usage of computer networks, privacy is becoming an abstract term. This course helps you protect yourself when going online, and also protects your home/office network.

 

In this course you will learn network concepts, what are they and how do they work.

You will learn about network types, topologies, addresses, architectures, and communication modes.

In addition, you will learn about network hardware like modems, routers, and switches; and about transmission media like cables and electromagnetic waves.

The course also covers securing a network and securing yourself in a network.

It does not take a lot of time to take and view the course, but the knowledge you get will benefit your personal, and also your business life.

Who this course is for:

  1. The course is for everyone interested in learning about computer networks.
  2. Students that need help with network subjects.
  3. People who simply want to improve their knowledge about computer networks.
  4. Anyone who tried to learn about a computer network, but failed due to the lack of a perceivable image of it.
  5. People preparing for certification exams (such as CCNA).
Show More

What Will You Learn?

  • Recognize the computer network implementation on various levels and explain how does it work;
  • Understand the network concept and the need for networks;
  • Set up a LAN;
  • Recognize networking devices and implement them in a computer network;
  • Differentiate network topologies;
  • Differentiate network architectures;
  • Tell the difference between communication modes;
  • Explain the basics of the OSI (7-layer) model;
  • Differentiate MAC addresses from IP addresses;

Course Content

Computer Networks part 3

  • User Authentication Protocols: Part 1
    00:00
  • User Authentication Protocols: Part 2
    00:00
  • User Authentication Protocols: Part 3
    00:00
  • User Authentication Protocols: Part 4 – Federated Identity Management
    00:00
  • Transport Layer Security: Part 1
    00:00
  • Transport Layer Security: Part 2 – TLS & HTTPS
    00:00
  • Transmission Control Protocol (TCP) : Part 1
    00:00
  • Wireless Network Security: Part 1
    00:00
  • Wireless Network Security: Part 2
    00:00
  • Wireless Network Security: Part 3 – WAP
    00:00
  • Email Security: Part 1 – PGP
    00:00
  • Email Security: Part 2 – S/MIME
    00:00
  • IP Security: Part 1
    00:00
  • IP Security: Part 2
    00:00
  • Intrusion Detection: Part 1
    00:00
  • Intrusion Detection: Part 2
    00:00
  • Authentication, Authorization, Accounting, (AAA) – Part 1
    00:00
  • Authentication, Authorization, Accounting (AAA) – Part 2
    00:00
  • Other Public Key Cryptosystems: Part 1
    00:00
  • Other Public Key Cryptosystems: Part 2
    00:00
  • Computer Networks and the Internet: Part 2 – Transmission Media
    00:00
  • Computer Networks and the Internet: Part 3
    00:00
  • WIRED EQUIVALENT PRIVACY (WEP): Part 2
    00:00
  • Fixing WEP Problems: Part 2
    00:00
  • Wireless Application Protocol (WAP)
    00:00
  • Fundamental Concepts of Computer Networks: Part 1 – PAN, LAN, MAN & WAN
    00:00
  • Fundamental Concepts of Computer Networks: Part 2 – OSI & TCP/IP Model Explained
    00:00
  • Internet & World Wide Web: Introduction & Key Concepts
    00:00
  • Shortest Paths and Dijkstra’s Algorithm: Part 1
    00:00
  • Shortest Paths and Dijkstra’s Algorithm: Part 2
    00:00
  • Shortest Paths and Dijkstra’s Algorithm: Part 3 – Example
    00:00
  • Net Neutrality
    00:00
  • Location-based Services & Mobile Advertising: Opportunities & Challenges – Part 1
    00:00
  • Location-based Services & Mobile Advertising: Opportunities & Challenges – Part 2
    00:00
  • Connected Dominating Sets and its Applications: Part 1
    00:00
  • Connected Dominating Sets and its Applications: Part 2 – Greedy Algorithm
    00:00
  • Strategic Crowdsourcing Networks for Geosensing Applications: Part 1
    00:00
  • Strategic Crowdsourcing Networks for Geosensing Applications: Part 2
    00:00
  • Strategic Crowdsourcing Networks for Geosensing Applications: Part 3
    00:00
  • Strategic Crowdsourcing Networks for Geosensing Applications: Part 4
    00:00
  • Wireless & Mobile Networking: Introduction
    00:00
  • Wireless & Mobile Networking: Facts and Trends: Part 1
    00:00
  • Wireless & Mobile Networking: Facts and Trends: Part 2
    00:00
  • Wireless & Mobile Networking: Facts and Trends: Part 3
    00:00
  • Wireless & Mobile Networking: Facts and Trends: Part 4
    00:00
  • Wireless & Mobile Networking: Facts and Trends: Part 5
    00:00
  • Wireless Coding and Modulation: Part 1 – Introduction
    00:00
  • Wireless Coding and Modulation: Part 2 -Shannon’s Theorem
    00:00
  • Wireless Coding and Modulation: Part 3 – Hamming Distance
    00:00
  • Wireless Coding and Modulation: Part 4 – FHSS & DSSS
    00:00
  • Wireless Coding and Modulation: Part 5 -Doppler Shift
    00:00

Student Ratings & Reviews

No Review Yet
No Review Yet
ResearcherStore

Want to receive push notifications for all major on-site activities?