Description
This is the first course in a five-part series on network communication, which includes the following modules: Network Fundamentals, The Power of Wireshark, TCP/IP and beyond!, Network Communication Programming with Python, and Cyber Attack Analysis.
These set of courses is presented under the slogan “Understanding Cyber Security” and are intended for every high school and university student, seeking knowledge and knowhow in cybersecurity. Together, these courses provide a comprehensive foundation in networking, combining theoretical knowledge with hands-on skills for analysing, building, and defending networked systems across a variety of real-world scenarios and technology environments. It strives to facilitate learning by thinking and understanding, and to promote students’ proficiency in handling complex ideas and mastering cybersecurity software projects.
This first course Understanding Cyber Security part 1 – Network Fundamentals introduces the evolution and key characteristics of modern networks, the TCP/IP and the OSI model, LAN architectures and topologies, and the roles of devices such as switches, bridges, and network interface cards (NICs). Core topics include fundamental communication concepts such as bandwidth and latency, network synchronicity and parallelism, as well as common LAN topologies and architectures, along with their advantages, limitations, and suitability for different use cases.
By the end of the course, students will be able to explain how devices communicate within a LAN, classify and compare network components, and evaluate how they orchestrate and work together to provide complete networking solutions that meet both functional and operational requirements.
visit understanding-cyber-security-part-2-the-power-of-wireshark for the next course in the series
Who this course is for:
- This course is intended for every high school and university student, seeking knowledge and knowhow in cybersecurity. It strives to facilitate learning by thinking and understanding, and to promote students’ proficiency in handling complex ideas and mastering cybersecurity software projects.
Reviews
There are no reviews yet.