Computer Networking and Security Learning Path
Computer networking is important as it allows multiple computers to connect with each other to share information and files. Security is hugely important when it comes to computer networks as networks are always at risk of attacks. Successful network attacks give outsiders a chance to destroy, alter, expose, disable, steal or gain unauthorized access to information. By studying the Alison Learning Path in Computer Networking and Security you will learn about how computer networking works. You will learn about different types of computer networks and their structures and functions. You will also learn about network security and its importance in computer networks. The Alison Learning Path in Computer Networking and Security is a series of courses that cover many aspects of computer networking and how to keep networks safe from attacks.
Courses in this Learning Path
Computer Networking - Local Area Networks and the OSI Model
First, you will study the basic concepts of networking and Local Area Networks. You will learn the key devices found on LANs such as hubs, switches, and routers, and how each of these devices functions to allow for effective and efficient communication on the LAN. You will then study the functions of IP addresses and how they are broken down into Network ID and Host ID components. The course will also cover the main network topologies, including Star, Bus, Ring and their functions.
Next, you will study the Ethernet - the most widely installed LAN technology - and learn how devices on an Ethernet network communicate with each other using Frames. You will then cover the seven layers of the OSI Model and learn how data is passed through them to allow two devices to communicate with each other. You will also study the TCP Model and learn about the similarities and differences between the OSI Model and the TCP Model in terms of their structure and functions.
Everybody uses computer networking for educational, business, or leisure purposes. However, not everyone understands what it is, how it functions, and what it does. This course will be of interest to all learners who would like to learn more about computer networking, in particular, the structure and function of LANs and the OSI Model. It will also be very useful to those who are considering computer networking as a career. So, have a look inside the course, and see if this is the next learning journey for you!1-2 Hour50 Points
Digital Communication Networks
First, this course will teach you about the OSI reference model and examine protocols like HTTP, TCP/IP, and ATM. It will also cover the characteristics of circuit-switched and packet-switched networks as well as connectionless and connection-oriented modes in packet-switched networks. You will learn about the role played by primitives in the OSI reference model as well as how ‘vertical’ and ‘horizontal’ communication takes place in this type of reference model.
Next, you will cover the subject of Transmission Control Protocol (TCP), Hypertext Transfer Protocol (HTTP), and Asynchronous Transfer Mode (ATM). You will learn how application software interacts with the TCP/IP protocol software, how to find the network and host addresses from IPv4 addresses, and how label switching can support IP over ATM. You will also study digital network security, threats to digital networks, and authentication and access control in digital networks.
This Digital Communication Networks online course will be of interest to professionals who work in information technology, network design, and network management industry. It will also be valuable to students who would like to have a greater understanding of what's behind a digital communication network program and how it functions. So, check out the course now, dig deeper on digital communication networks, and give your career development a boost today.2-3 Hours50 Points
Computer Networking - Wired and Wireless Networks and Protocols
Computer Networking - Wired and Wireless Networks and Protocols introduces you in a step-by-step manner to the structure and function of wired and wireless networks and their protocols. The course begins by introducing you to cabling systems for wired networks, in particular the twisted-pair cable, and cable speeds and the cable types. You will also learn about the tools needed when making the connections between patch panels and RJ45 jacks.
You will learn about the structure of Internet Protocol addresses in detail, including IP Ranges and their classes. You will compare and contrast the structure and function of IPv4 and IPv6 addresses and will learn about the role of Default gateway and DNS server in networking.
Finally, the course introduces you basic TCP/IP tools such as command prompt, ipconfig and ping, and the use of these tools will be demonstrated. Next, you will be introduced to advanced TCP/IP tools such as Netstat, Pathping, Nslookup, Telnet, NbtStat and Netsh. Again, these tools and their uses will be demonstrated.
This course will be of interest to all learners who would like to learn more about computer networking, in particular the structure and function of wired and wireless networks and their protocols. It will also be of great interest to all learners who are considering computer networking as a career or who are considering doing professional computer networking exams.2-3 Hours50 Points
Wide Area Networks and Networking Services and Security
Learn in a step-by-step manner the concept of wide area network and networking services by studying the course Wide Area Networks and Networking Services and Security. The course begins by introducing you to Dynamic Host Configuration Protocol, which is a client/server protocol that enables configured client computers to obtain IP addresses automatically. You will learn how IP addresses are leased to client computers and the role of DORA (Discovery, Offer, Request, Acknowledge) and APIPA (Automatic Private IP Addressing).
Next, you will be introduced to Remote Desktop Services and how it enables Virtual desktop infrastructure (VDI). You will learn how Routing and Remote Access Service (RRAS) supports remote user or site-to-site connectivity by using Virtual private network (VPN)and Dial-up connections. You will also learn about Internet Protocol Security (IPSec) which is a protocol within the TCP/IP suite that encrypts and authenticates IP packets.
You will learn about Routing which is the process of managing the flow of data between network segments and between hosts or routers. You will review common dynamic routing protocols such as Distance vector routing (Routing Information Protocol (RIP) and Link state routing (Open Shortest Path First (OSPF)). You will also learn about Interior Gateway Protocols, routing protocols that were designed for use within Autonomous Systems, and Exterior Gateway Protocols, routing protocols that were designed for use between Autonomous Systems.
This course will be of interest to all learners who would like to learn more about computer networking, in particular the structure and function of wide area networks and networking services and security. It will also be of great interest to all learners who are considering computer networking as a career or who are considering doing professional computer networking exams.1-2 Hour50 Points
Fundamentals of Network Security
This online course teaches the fundamentals of network security and covers topics such as active and passive attacks on networks, encryption, symmetric and asymmetric key systems, authentication using network security certification authorities, and access control using passwords and firewalls. It will help you understand and be more aware of the potential threats that are continuously experienced in computer networks today, and will show you how to combat these threats.
Next, you will learn what types of businesses are more at risk of security concerns and be guided through the actions to be taken to reduce these threats. Threats in your own computer network can be avoided if you know the correct measures to be undertaken. Once you learn about these measures and gain an understanding of the most important elements of computer security, you'll be able to keep your computer network safe.
By the end of this free online network and security course, you will be able to identify and respond to different cyber threats and attacks that move across your network. These lessons will benefit not only IT and network security management professionals who want to learn more about network security, but also students who are interested in a career as an IT professional or network administrator. So, enrol in this online course today and gain a highly valuable professional skill.1-2 Hour50 Points
Understanding Cryptography and Its Role in Digital Communications
Cryptography plays a vital role in modern digital communication systems. Cryptographic methods allow the encryption and decryption of messages sent across digital communication networks.
In this course the learner is first introduced to ancient ciphers and how they were used. The vital role of randomness in cryptographic methods is then explained and the learner is taken through step-by-step examples. The role of key scientists such as John von Neuman is also explained.
This course will be of great interest to all learners who would like to learn more about cryptography and the vital role it plays in today's digital communication networks.1-2 Hour50 Points
Computer Networking - Digital Network Security
Computer Networking - Digital Network Security is a course that will introduce you to the network architecture and protocols used in network security.
The course begins by describing the features and functions of VPN protocol: Point-to-Point Tunneling Protocol (PPTP). You will learn how Point-to-Point Tunneling Protocol (PPTP) encapsulates Point-to-Point (PPP) frames into IP datagrams for transmission over an IP-based network. You will learn about L2TP and how it relies on IPSec in Transport Mode for encryption services.
You will then learn about Firewalls which are the most commonly used type of security device in an organization's perimeter and how they protect a network from malicious attack and unwanted intrusion. You will learn about the role of a Perimeter network that keep certain information open to specific users or to the public while keeping the rest of an organization's data secret.
You will learn about the two types of Packet filtering (Stateless and Stateful) and their functions. Next you will learn about Application-level gateway functions and how it supports address and port translation and checks whether the type of application traffic is allowed.
Finally, you will learn about the Network Intrusion Detection System (NIDS) which detects malicious network activities by monitoring network traffic, and the Network Intrusion Prevention System (NIPS) which inspects network traffic and can remove, detain or redirect malicious traffic.
This course will be of interest to all learners who would like to learn more about computer networking, the network architecture and protocols used in network security. It will also be of great interest to all learners who are considering computer networking as a career or who are considering doing professional computer networking exams.1-2 Hour50 Points