260€
Course in Computer Networks: Architecture, Protocols, and Cybersecurity
100% Online
3 meses
260€
Presentación
In today's digital landscape, the demand for expertise in computer networks is soaring. The Course in Computer Networks: Architecture, Protocols, and Cybersecurity is your gateway to mastering this dynamic field. Immerse yourself in the essential concepts and cutting-edge practices that define network architecture and protocols. In an era where cybersecurity threats are ever-evolving, understanding how to protect and secure networks is crucial. This course empowers you with the skills to design robust networks, implement effective protocols, and ensure cybersecurity resilience. As businesses increasingly rely on digital infrastructure, your expertise will be indispensable. Position yourself at the forefront of this high-demand sector, where opportunities abound, and become a sought-after professional in an industry that shapes the future. Join us online and transform your career potential.
Universidades colaboradoras
Para qué te prepara
This course equips you with the skills to design and manage complex computer networks, understand and implement various network protocols, and bolster cybersecurity measures. By the end, you'll be able to analyse network architectures, troubleshoot connectivity issues, and apply security practices to protect data integrity and privacy. This knowledge enables you to enhance network efficiency and security in professional settings.
Objetivos
- To understand the architecture of computer networks in various environments. - To identify and explain key network protocols and their functions. - To analyse network security threats and propose solutions. - To evaluate different network topologies and their applications. - To compare the features of wired and wireless communication networks. - To explore the role of cybersecurity in network management. - To interpret network performance metrics for optimisation.
A quién va dirigido
This course is designed for professionals and graduates in the field of computer science and IT who are keen to expand or update their knowledge in computer networks. Ideal for those interested in understanding network architecture, protocols, and cybersecurity measures, it offers valuable insights without being overly complex, making it accessible to a broad audience.
Salidas Profesionales
- Network Architect: Design and implement robust network infrastructures. - Cybersecurity Analyst: Protect systems from cyber threats and vulnerabilities. - Network Administrator: Manage and maintain organisational networks. - Protocol Developer: Create and optimise communication protocols. - IT Consultant: Advise on network and security solutions for businesses.
Temario
UNIT 1. INTRODUCTION TO THE NETWORK
- Main elements of a network
- Network technology
- Support for business continuity
UNIT 2. PROTOCOL STANDARDISATION
- OSI Model
- Pragmatic Approach of the Layer Model
- Standards and Organisations
UNIT 3. DATA TRANSMISSION AT THE PHYSICAL LAYER
- Role of a network interface
- Options and Configuration Settings
- Booting from the Network
- Data encoding
- Signal conversion
- Transmission Supports
UNIT 4. COMMUNICATIONS SOFTWARE
- Network card configuration
- Network card driver installation and configuration
- Protocol stack
- Detecting a network problem
UNIT 5. NETWORK AND INTERCONNECTION ARCHITECTURE
- Topologies
- Choosing the adapted network topology
- Communications Management
- Interconnection
UNIT 6. THE LOWER LAYERS OF PERSONAL AND LOCAL NETWORKS
- Lower Layers and IEEE
- Ethernet and IEEE 802.3
- Token Ring and IEEE 802.5
- Wi-Fi and IEEE 802.11
- Bluetooth and IEEE 802.15
- Other technologies
UNIT 7. MAN AND WAN NETWORKS: PROTOCOLS
- Local network interconnection
- Remote access and virtual private networks
UNIT 8. PROTOCOLS FOR MIDDLE AND UPPER LAYERS
- Main protocol families
- IP protocol version 4
- IP protocol version 6
- Other Internet layer protocols
- Voice over IP (VoIP)
- TCP and UDP transport protocols
- TCP/IP application layer
UNIT 9. PROTECTING A NETWORK
- Understanding the need for security
- Tools and Types of Attack
- Protection Concepts in Local Area Network
- Network Interconnection Protection
UNIT 10. NETWORK REPAIR
- Introduction to network repair
- Diagnosis in lower layers
- Using Adapted TCP/IP Tools
- Analysis Tools for Upper Layers
UNIT 11. SAFE COMMUNICATIONS: LAYERED SECURITY
- Security at the Physical Layer
- Security at the Data Link Layer
- Security at the Network Layer
- Security at the Transport Layer
- Security at the Application Layer
UNIT 12. APPLICATION OF A PUBLIC KEY INFRASTRUCTURE (PKI)
- Identification of the PKI Components and its Relationship Models
- Certificate Authority and its Elements
- Certificate Revocation List (CRL)
- How certificate signing requests (CSRs) work
- Private Management Infrastructures (PMIs)
- Attribute Certificate Fields
- Applications that rely on the existence of a PKI
UNIT 13. INTRUSION DETECTION SYSTEMS AND INTRUSION PREVENTION SYSTEMS (IDS/IPS)
- General Concepts
- Identification and Characterisation of the System Operating Data
- Most common IDS architectures
- Relation between the Different IDS/IPS
- Security Criteria to Establish the Location of the IDS/IPS
UNIT 14. IMPLEMENTATION AND PRODUCTION OF IDS/IPS
- Prior Analysis
- Definition of Policies to Cut Off Intrusion Attempts
- Analysis of the events recorded by the IDS/IPS
- List of Audit Records
- Establishment of the Required Levels
UNIT 15. INTRODUCTION TO THE SIEM SYSTEMS
- What Is SIEM?
- Evolution of the SIEM Systems
- Architecture of a SIEM system
UNIT 16. SIEM SYSTEMS CAPABILITIES
- Problems to solve
- Log management
- IT Compliance Standards
- Event Correlation
- SIEM solutions on the market
Titulación
Solicitar información