Computer Networking and Security Learning Path
Computer networking is important as it allows multiple computers to connect with each other to share information and files. Security is hugely important when it comes to computer networks as networks are always at risk of attacks. Successful network attacks give outsiders a chance to destroy, alter, expose, disable, steal or gain unauthorized access to information. By studying the Alison Learning Path in Computer Networking and Security you will learn about how computer networking works. You will learn about different types of computer networks and their structures and functions. You will also learn about network security and its importance in computer networks. The Alison Learning Path in Computer Networking and Security is a series of courses that cover many aspects of computer networking and how to keep networks safe from attacks.
Courses in this Learning Path
Computer Networking - Local Area Networks and the OSI Model
First, you will study the basic concepts of networking and Local Area Networks. You will learn the key devices found on LANs such as hubs, switches, and routers, and how each of these devices functions to allow for effective and efficient communication on the LAN. You will then study the functions of IP addresses and how they are broken down into Network ID and Host ID components. The course will also cover the main network topologies, including Star, Bus, Ring and their functions.
Next, you will study the Ethernet - the most widely installed LAN technology - and learn how devices on an Ethernet network communicate with each other using Frames. You will then cover the seven layers of the OSI Model and learn how data is passed through them to allow two devices to communicate with each other. You will also study the TCP Model and learn about the similarities and differences between the OSI Model and the TCP Model in terms of their structure and functions.
Everybody uses computer networking for educational, business, or leisure purposes. However, not everyone understands what it is, how it functions, and what it does. This course will be of interest to all learners who would like to learn more about computer networking, in particular, the structure and function of LANs and the OSI Model. It will also be very useful to those who are considering computer networking as a career. So, have a look inside the course, and see if this is the next learning journey for you!1.5-3 Hour50 Points
Computer Networking - Wired and Wireless Networks and Protocols
Computer Networking - Wired and Wireless Networks and Protocols introduces you in a step-by-step manner to the structure and function of wired and wireless networks and their protocols. The course begins by introducing you to cabling systems for wired networks, in particular the twisted-pair cable, and cable speeds and the cable types. You will also learn about the tools needed when making the connections between patch panels and RJ45 jacks.
You will learn about the structure of Internet Protocol addresses in detail, including IP Ranges and their classes. You will compare and contrast the structure and function of IPv4 and IPv6 addresses and will learn about the role of Default gateway and DNS server in networking.
Finally, the course introduces you basic TCP/IP tools such as command prompt, ipconfig and ping, and the use of these tools will be demonstrated. Next, you will be introduced to advanced TCP/IP tools such as Netstat, Pathping, Nslookup, Telnet, NbtStat and Netsh. Again, these tools and their uses will be demonstrated.
This course will be of interest to all learners who would like to learn more about computer networking, in particular the structure and function of wired and wireless networks and their protocols. It will also be of great interest to all learners who are considering computer networking as a career or who are considering doing professional computer networking exams.1.5-3 Hour50 Points
Wide Area Networks and Networking Services and Security
Learn in a step-by-step manner the concept of wide area network and networking services by studying the course Wide Area Networks and Networking Services and Security. The course begins by introducing you to Dynamic Host Configuration Protocol, which is a client/server protocol that enables configured client computers to obtain IP addresses automatically. You will learn how IP addresses are leased to client computers and the role of DORA (Discovery, Offer, Request, Acknowledge) and APIPA (Automatic Private IP Addressing).
Next, you will be introduced to Remote Desktop Services and how it enables Virtual desktop infrastructure (VDI). You will learn how Routing and Remote Access Service (RRAS) supports remote user or site-to-site connectivity by using Virtual private network (VPN)and Dial-up connections. You will also learn about Internet Protocol Security (IPSec) which is a protocol within the TCP/IP suite that encrypts and authenticates IP packets.
You will learn about Routing which is the process of managing the flow of data between network segments and between hosts or routers. You will review common dynamic routing protocols such as Distance vector routing (Routing Information Protocol (RIP) and Link state routing (Open Shortest Path First (OSPF)). You will also learn about Interior Gateway Protocols, routing protocols that were designed for use within Autonomous Systems, and Exterior Gateway Protocols, routing protocols that were designed for use between Autonomous Systems.
This course will be of interest to all learners who would like to learn more about computer networking, in particular the structure and function of wide area networks and networking services and security. It will also be of great interest to all learners who are considering computer networking as a career or who are considering doing professional computer networking exams.1.5-3 Hour50 Points
Understanding Cryptography and Its Role in Digital Communications
Cryptography plays a vital role in modern digital communication systems. With this course, you will learn how cryptographic methods allow the encryption and decryption of messages sent across digital communication networks. You will study the use of cyphers, the probability space, the Caesar Cipher which is one of the simplest and most widely known encryption techniques, and the Polyalphabetic Cipher which is a cypher that is based on substitution using multiple substitution alphabets.
You will then look into the one-time pad which is an encryption technique that cannot be cracked, but requires a one-time pre-shared key of the same size as, or longer than, the message being sent. This course will also discuss Claude Shannon's Perfect Secrecy, the Fundamental Theorem of Arithmetic, RSA Encryption, and Euler's Totient Phi Function. You will also delve into the WW2 Enigma Machine which is an encryption device developed and used in the early- to mid-20th century, and more!
Cryptography is the process of converting ordinary plain text into unintelligible text and vice-versa using different encryption methods. Upon the completion of this course, you will have a better understanding of the use of cyphers and the role of randomness in encryption. You will also gain better insight into the development of RSA encryption, the Diffie-Hellman Key Exchange, and more. Sign up for this course today and start learning more about cryptography and its role in today's digital communication networks.1.5-3 Hour50 Points
Introduction to Computer Network Security
Security in your computer network is of vital importance and this course, "Introduction to Computer Network Security", will introduce you to the core principles of security and physical access security. You will learn about the different authentication processes in your system. You will learn about user rights and permissions. You will learn about tracking users in the system, and about creating proper passwords and common attacks used by hackers to get your passwords.
The computer networks security course starts off by introducing you to the core principles of computer network security. You will learn about privilege levels and what the attack surfaces involve. You will learn about social engineering and people gaining unauthorized access control to the system through that. The course teaches you about the four parts of risk management, and about physical security as the first line of defense. You will also learn about the different layers of physical security.
In the next part, the course reviews authentication. You will learn about the different methods of authentication, and setting rights and permissions for users. You will also learn about sharing folders and files. You will learn about tracking users with auditing and about encrypting your data.
Finally, the course reviews issues around password security. You will learn about common password attacks, what a keylogger and sniffers are, and how to create complex passwords that increase information security. The course also covers how to set up an account lockout for when a user incorrectly attempts to login into your system.
This course is great opportunity for IT specialists, computing students, computer network traffic engineers, and anyone who wishes to learn more about both network and wireless security in computing.1.5-3 Hour50 Points
Computer Networking - Digital Network Security
Computer Networking - Digital Network Security is a course that will introduce you to the network architecture and protocols used in network security.
The course begins by describing the features and functions of VPN protocol: Point-to-Point Tunneling Protocol (PPTP). You will learn how Point-to-Point Tunneling Protocol (PPTP) encapsulates Point-to-Point (PPP) frames into IP datagrams for transmission over an IP-based network. You will learn about L2TP and how it relies on IPSec in Transport Mode for encryption services.
You will then learn about Firewalls which are the most commonly used type of security device in an organization's perimeter and how they protect a network from malicious attack and unwanted intrusion. You will learn about the role of a Perimeter network that keep certain information open to specific users or to the public while keeping the rest of an organization's data secret.
You will learn about the two types of Packet filtering (Stateless and Stateful) and their functions. Next you will learn about Application-level gateway functions and how it supports address and port translation and checks whether the type of application traffic is allowed.
Finally, you will learn about the Network Intrusion Detection System (NIDS) which detects malicious network activities by monitoring network traffic, and the Network Intrusion Prevention System (NIPS) which inspects network traffic and can remove, detain or redirect malicious traffic.
This course will be of interest to all learners who would like to learn more about computer networking, the network architecture and protocols used in network security. It will also be of great interest to all learners who are considering computer networking as a career or who are considering doing professional computer networking exams.1.5-3 Hour50 Points