Example Curriculum
Introduction
Available in
days
days
after you enroll
Introduction to Networking
Available in
days
days
after you enroll
- What is Networking? (3:44)
- Note: This Section Is Optional!
- Different Types of Networks (5:07)
- LAN vs. WAN (4:29)
- Understanding a Simple Network - Part 1 (1:00)
- Mac Addresses (3:14)
- Routers, Switches, Modems (7:49)
- Client Server vs. Peer to Peer (3:14)
- Understanding a Simple Network - Part 2 (1:01)
- Star Topology (2:26)
- Bus Topology (2:41)
- Ring Topology (2:32)
- Mesh Topology (1:46)
- Hybrid Topology (2:54)
- IP Addresses (5:33)
- Subnetting (6:41)
- Common Networking Commands (8:57)
- OSI (Open Systems Interconnection) Model (3:22)
- What Is a Protocol? (2:12)
- TCP/IP (4:37)
- HTTP, HTTPS (3:44)
- FTP (3:48)
- DNS (6:31)
- SSH (2:28)
- Other Common Protocols (2:42)
- Understanding a Simple Network - Part 3 (2:16)
- Types Of Network Threats (4:19)
- Windows Firewall (8:29)
- Understanding a Simple Network - Part 4 (1:11)
Denial of Service Attack
Available in
days
days
after you enroll
Bypassing Routers Whitelist/Blacklist
Available in
days
days
after you enroll
Man In The Middle Attack (MITM)
Available in
days
days
after you enroll
DNS Attacks
Available in
days
days
after you enroll
Vulnerabilities In Protocols/Components
Available in
days
days
after you enroll
DHCP Attacks
Available in
days
days
after you enroll
Router Attacks
Available in
days
days
after you enroll
Weak Cryptography
Available in
days
days
after you enroll
Manually Exploiting Application Over The Network
Available in
days
days
after you enroll
Protecting The Network
Available in
days
days
after you enroll
Where To Go From Here?
Available in
days
days
after you enroll