• LOGIN
  • No products in the cart.

This course focuses on designing and analyzing secured network system. It focuses on dealing with vulnerabilities, threats, motive, opportunity and methods used by hackers as well as confidentiality and integrity.

You will be able to identify the main causes of cyber-attacks, the threats they possess and how to defend them once you have completed this course. It discusses five methods of defense which are Prevention, Deterioration, Deflection, Detection and Recovery.

Assessment

This course does not involve any written exams. Students need to answer 5 assignment questions to complete the course, the answers will be in the form of written work in pdf or word. Students can write the answers in their own time. Each answer needs to be 200 words (1 Page). Once the answers are submitted, the tutor will check and assess the work.

Certification

Edukite courses are free to study. To successfully complete a course you must submit all the assignment of the course as part of the assessment. Upon successful completion of a course, you can choose to make your achievement formal by obtaining your Certificate at a cost of £49.

Having an Official Edukite Certification is a great way to celebrate and share your success. You can:

  • Add the certificate to your CV or resume and brighten up your career
  • Show it to prove your success

 

Course Credit: University of Colorado

Course Curriculum

Module 01
Network Security – Design and Analyze Secure Networked Systems – Overview 00:03:00
Network Security – Vulnerabilities and Threats 00:12:00
Network Security – Method, Opportunity, and Motive 00:05:00
Network Security – Confidentiality, Integrity, and Availability 00:14:00
Network Security – Risk, Risk Assessment and Method of Defense 00:07:00
Network Security – Security Principles, Defense with Diversity, Cyber Resilience 00:07:00
Network Security – Apply Principle of Least Privileges for Access Control 00:10:00
Network Security – Principle of Adequate Data Protection 00:05:00
Module 02
Network Security – In Software We Trust Really 00:10:00
Network Security – Sign Software with GPG 00:12:00
Network Security – Verify Software Integrity and Authenticity 00:09:00
Network Security – Web of Trust 00:10:00
Network Security – Public Key Infrastructure 00:11:00
Network Security – What are in a Certificate 00:09:00
Network Security – Being Your Own CA 00:22:00
Network Security – Server Certificate and Installation 00:14:00
Network Security – Setup Client Certificate 00:07:00
Network Security – Client Server Mutual Authentication 00:08:00
Module 03
Network Security – Basic Cryptography and Programming with Crypto API: Course Overview 00:03:00
Network Security – Basic Cryptography 00:10:00
Network Security – Kerckhoff’s Principle 00:09:00
Network Security – CryptoAnalysis of Monoalphabetic Substitution Cipher 00:13:00
Network Security – Columnar Transposition Ciphers 00:04:00
Network Security – One Time Pad & Quantum Key Distribution 00:10:00
Network Security – Symmetric Key Algorithm 00:09:00
Network Security – Advanced Encryption Standard 00:09:00
Module 04
Network Security – AES Expansion Schedule 00:05:00
Network Security – AES Selection Criteria 00:13:00
Network Security – Dealing with Block Swapping and Replay Attacks 00:08:00
Network Security – Block Cipher Mode of Operation 00:11:00
Network Security – Diffie Hellman Symmetric Key Exchange Protocol 00:07:00
Network Security – Modular Arithmetic 00:14:00
Network Security – Euler Totient Theorem 00:14:00
Network Security – RSA Asymmetric Crypto Algorithm 00:18:00
Network Security – Understanding RSA with Open SSL 00:06:00
Network Security – Use Crypto API to Encrypt and Decrypt 00:15:00
Network Security – Use Crypto API to Sign and Verify 00:10:00
Network Security – Mini Capstone Enhance Registration Web Site Security 00:20:00
Module 05
Network Security – Course 3 – Hacking and Patching Overview 00:03:00
Network Security – Command Injection 00:12:00
Network Security – Review Code to Detect Pattern to Defend Command Injection 00:12:00
Network Security – Apply Security Design Pattern to Defend Command Injection Attack 00:07:00
Network Security – SQL Injection Attacks 00:11:00
Network Security – Patching Web App with SQL Injection Vulnerability 00:05:00
Network Security – Hacking Methodology 00:10:00
Network Security – Demystify New OSPL Will Not Havev Injection Vulnerabilities 00:08:00
Network Security – Demystify New OSPL Will Not Havev Injection Vulnerabilities 00:08:00
Module 06
Network Security – Escalate Privileges via Deploying Trojan 00:11:00
Network Security – Escalate Privileges by Bringing in Sophisticated Trojan 00:09:00
Network Security – Security in Memory Systems and Virtual Memory Layout 00:15:00
Network Security – Variables Allocation in Virtual Memory Layout 00:06:00
Network Security – Buffer Overflow 00:14:00
Network Security – Buffer Overflow Defense 00:16:00
Network Security – Vulnerability Scanning with Nessus 00:07:00
Network Security – Vulnerability and WannaCry Ransomware 00:08:00
Module 07
Network Security – Penetration Testing with Kali Linux 00:07:00
Network Security – Metasploit Framework 00:11:00
Network Security – Keylogging 00:03:00
Network Security – Remote VNC Server Injection 00:02:00
Network Security – Secure Networked System with Firewall and IDS Course Overview 00:02:00
Network Security – Network Defense 00:08:00
Network Security – DMZ Firewall 00:08:00
Module 08
Network Security – iptables and Inbound Traffic 00:14:00
Network Security – iptables and Outbound Traffic 00:07:00
Network Security – Stateful Firewall 00:02:00
Network Security – Snort IDS 00:12:00
Network Security – Evaluate Firewall Performance 00:03:00
Network Security – Host IDS 00:04:00
Assessment
Submit Your Assignment 00:00:00
Certification 00:00:00

Course Reviews

4.7

4.7
9 ratings
  • 5 stars0
  • 4 stars0
  • 3 stars0
  • 2 stars0
  • 1 stars0

No Reviews found for this course.

11 STUDENTS ENROLLED
©2021 Edukite. All Rights Resereved
Edukite is A Part Of Ebrahim College, Charity Commission
Reg No 110841