Computer Networking - Digital Network Security - Revised

Network and Security
Free Course
Computer Networking - Digital Network Security will introduce you to the network protocols and architecture commonly used in network security.
  • Duration

    1-2 Hours
  • Assessment

  • Certification

  • Responsive

  • Publisher

    Channel 9




View course modules

This course begins with the functions and features of VPN protocol: Point-to-Point Tunneling Protocol (PPTP). You will investigate Point-to-Point Tunneling Protocol (PPTP) and how it encapsulates Point-to-Point (PPP) frames into IP datagrams for transmission over a network.

You will see how L2TP relies on IPSec in Transport Mode for types of encryption services. You will then learn about Firewalls; the most commonly used type of security device in any organization's perimeter. Firewalls protect a network from unwanted intrusion and malicious attack. You will learn about Perimeter networks. These networks keep certain information open to some users or to the public while keeping the rest hidden. You will learn about Stateless and Stateful Packet filtering and their functions.

Next, you will learn about Application-level gateway functions. These support address and port translations and check whether the type of application traffic should be allowed. Finally, you will investigate the Network Intrusion Detection System (NIDS) which can monitor network traffic and the Network Intrusion Prevention System (NIPS) which can redirect, detain or even remove malicious traffic.

This will be of interest to all learners looking to learn more about computer networking, the network protocols and architecture seen in network security. It will also be of great interest to anyone considering computer networking professionally or who are considering doing computer networking exams.

Start Course Now

Having completed this course you will be able to:

  • Describe how Firewalls protect network security.
  • Describe how the role of a Perimeter network.
  • List the two types of Packet filtering and their functions.
  • Describe how an Application-level gateway functions.
  • Explain the different types of Network security systems.
  • Describe the features and functions of VPN protocol:
  • Point-to-Point Tunneling Protocol (PPTP).

All Alison courses are free to enrol, study and complete. To successfully complete this Certificate course and become an Alison Graduate, you need to achieve 80% or higher in each course assessment. Once you have completed this Certificate course, you have the option to acquire official Certification, which is a great way to share your achievement with the world. Your Alison Certification is:

Ideal for sharing with potential employers - include it in your CV, professional social media profiles and job applications
An indication of your commitment to continuously learn, upskill and achieve high results
An incentive for you to continue empowering yourself through lifelong learning

Alison offers 3 types of Certification for completed Certificate courses:

Digital Certificate - a downloadable Certificate in PDF format, immediately available to you when you complete your purchase
Certificate - a physical version of your officially branded and security-marked Certificate, posted to you with FREE shipping
Framed Certificate - a physical version of your officially branded and security-marked Certificate in a stylish frame, posted to you with FREE shipping

All Certification is available to purchase through the Alison Shop. For more information on purchasing Alison Certification, please visit our faqs. If you decide not to purchase your Alison Certification, you can still demonstrate your achievement by sharing your Learner Record or Learner Achievement Verification, both of which are accessible from your Dashboard. For more details on our Certification pricing, please visit our Pricing Page.


Course Reviews


You have received a new notification

Click here to view them all