Securing the Network Infrastructure
- Describe, compare and identify various network concepts Fundamentals of TCP/IP
- Describe and compare fundamental security concepts
- Describe network applications and the security challenges Understand basic cryptography principles
- Basic networking knowledge
- Basic cyber security knowledge
Who is this course intended for?
Anyone who wants to learn vulnerability management, computer networking and cloud security
Corey Charles is Security+, Qualys Vulnerability Management Specialist Certified. Mr. Charles has 11 years experience in IT Security with a direct focus in Vulnerability Management. Mr. Charles also taught on the collegiate level, teaching IT Security at Herzing University.
Mr. Charles also holds two Bachelors of Arts Degrees, Digital Design and Media Arts, one Associates, Digital Design from Tulane University. Two Master Degrees from Strayer University, Master of Science in Computer.
Security Management and Master of Science in Computer Forensics Management. He holds an Executive Graduate Certification in Computer Networking.
|Understanding the OSI Model|
|Data Encapsulation and De-Encapsulation||00:00:00|
|An Important Message From Corey||00:00:00|
|Introduction to the Internet Protocol||00:00:00|
|IP Address Classes||00:00:00|
|Reserved IP Addresses||00:00:00|
|Public and Private IP Addresses||00:00:00|
|Transmission Control Protocol|
|Introduction to Transmission Control Protocol||00:00:00|
|TCP Three-Way Handshake||00:00:00|
|User Datagram Protocol|
|Introduction to the User Datagram Protocol||00:00:00|
|TCP and UDP Ports||00:00:00|
|Address Resolution Protocol||00:00:00|
|Host-to-Host Packet Delivery Using TCP||00:00:00|
|TCP Session Hijacking||00:00:00|
|Nessus Vulnerability Scanner|
|Nessus Practical Lab||00:00:00|
No Reviews found for this course.