This course covers the fundamentals of computer networking, focusing on the aspects of security. Participants will understand the different components of a computer, the interworks of Windows OS, and grasp essential networking concepts. Graduates of this training can safely embark on more advanced concept of network security, cyber forensics and ethical hacking courses.

The course targets participants without basic networking background, who wish to acquire a deeper understanding of the field for a later specialization in ethical hacking, computer forensics and advanced network security.

    Basic familiarity with using computers and the internet.

    }

    40 Hours

    Cyber Security

    h

    Certificate: No

    Price: contact us for more details

    Leave your details

    Course Outline

    Objectives

    • Understanding computer systems, software and hardware on a deeper level.
    • Grasping the logic of computer language and learning how to use it.
    • Study networking and see where and how it applies to security.
    • Learn to analyze networks and configure them according to specific needs.
    • Get familiar with basics of “Google hacking”

      Course Outline

      • Processor

       

      Module 1: Introduction to Computer Components – 6 hours

      The first module will introduce students to the basics of computer architecture and set-up, and explain how computers “read” commands and analyze them.

      • Computer memory units
      • Binary numbers
      • ASCII
      • Computer hardware
      • Mother-board
      • Processor

       

      Module 2: Windows Operating System – 10 hours

      Understanding Windows OS on a deeper level is crucial for security practitioners or forensics examiners. This module will uncover the differences between available Windows versions, and explain further concepts of configuration and administration.

      • 32bit vs. 64bit
      • Driver
      • Device manager
      • System processes
      • “Based on dll” concept explained
      • OS for servers
      • OS installation types
      • Keyboard shortcuts and advanced techniques
      • BIOS
      • UEFI
      • Virtualization
      • CMD commands
      • Basic batch

       

      Module 3: Introduction to Networking – 4 hours

      The world of computer networking provides a significant base to understanding and practicing ethical hacking, computer forensics and system administration. The module will cover introductory concepts of networking and prepare participants for further development in the field.

      • Network devices
        • Router
        • Switch
        • HUB
      • Basic networking concepts
        • Data transmission protocols
        • IP routing concepts
        • Network neighbors

      Module 4: IPv4 –  4 hours

      • Internal addresses
      • External addresses
      • Special addresses
      • Networking rules

       

      • Module 5: Networks – 12 hours

        This module will introduce participants to the world of networks, explaining different network components and relevant settings. They will cover basic concepts and quickly reach an advanced level of understanding of how to inspect a network and analyze it.

        • Exploring the network
          • Network topologies
          • DHCP
          • DNS
        • Configuring a VM for network analysis
          • NAT and bridged
          • VM settings
        • Network protocols and communications
          • TCP
          • UDP
          • ICMP
          • ARP
        • TCP/IP and OSI model
        • OSI Layers:
          • Application
          • Presentation
          • Session
          • Transport
          • Network
          • Data Link
          • Physical
        • Layering concept
        • Understand TCP/IP model
        • Data type handled
        • Common protocols and technologies used in each layer
        • Flow control
        • Importance and advantages of layered models
        • IP addresses
          • Dynamic IP addresses
          • Static IP addresses
          • IPv4
            • Private addresses
            • Public addresses
            • Classes
            • Subnetting
          • LAB: Divide networks to vLANs by subnets and computers to be requested via Cisco Packet Tracer
        • Network services
          • Pop3
          • IMAP
          • SMTP
          • File sharing
          • VoIP
          • SNMP
          • Internet access

        Module 6: The Correct Use of Google – 4 hours

        • The basics of search
        • Search engines input for optimal results
        • “Boolean” operators in Google
          • OR, AND, OR+AND
        • Google inline filters
        • Google hacking database (GDHB)
        • Google hacking tools
        • Anonymous googling