Course in Computer Networks: Architecture, Protocols, and Cybersecurity
100% Online
3 meses
260€

    Course in Computer Networks: Architecture, Protocols, and Cybersecurity

    100% Online
    3 meses
    260€
    Seguridad y confianza en tus pagos online.

    Presentación

    In today's digital landscape, the demand for expertise in computer networks is soaring. The Course in Computer Networks: Architecture, Protocols, and Cybersecurity is your gateway to mastering this dynamic field. Immerse yourself in the essential concepts and cutting-edge practices that define network architecture and protocols. In an era where cybersecurity threats are ever-evolving, understanding how to protect and secure networks is crucial. This course empowers you with the skills to design robust networks, implement effective protocols, and ensure cybersecurity resilience. As businesses increasingly rely on digital infrastructure, your expertise will be indispensable. Position yourself at the forefront of this high-demand sector, where opportunities abound, and become a sought-after professional in an industry that shapes the future. Join us online and transform your career potential.
    Qs World University Rankings

    Universidades colaboradoras

    Para qué te prepara
    This course equips you with the skills to design and manage complex computer networks, understand and implement various network protocols, and bolster cybersecurity measures. By the end, you'll be able to analyse network architectures, troubleshoot connectivity issues, and apply security practices to protect data integrity and privacy. This knowledge enables you to enhance network efficiency and security in professional settings.
    Objetivos
    - To understand the architecture of computer networks in various environments. - To identify and explain key network protocols and their functions. - To analyse network security threats and propose solutions. - To evaluate different network topologies and their applications. - To compare the features of wired and wireless communication networks. - To explore the role of cybersecurity in network management. - To interpret network performance metrics for optimisation.
    A quién va dirigido
    This course is designed for professionals and graduates in the field of computer science and IT who are keen to expand or update their knowledge in computer networks. Ideal for those interested in understanding network architecture, protocols, and cybersecurity measures, it offers valuable insights without being overly complex, making it accessible to a broad audience.
    Salidas Profesionales
    - Network Architect: Design and implement robust network infrastructures. - Cybersecurity Analyst: Protect systems from cyber threats and vulnerabilities. - Network Administrator: Manage and maintain organisational networks. - Protocol Developer: Create and optimise communication protocols. - IT Consultant: Advise on network and security solutions for businesses.
    Temario

    UNIT 1. INTRODUCTION TO THE NETWORK

    1. Main elements of a network
    2. Network technology
    3. Support for business continuity

    UNIT 2. PROTOCOL STANDARDISATION

    1. OSI Model
    2. Pragmatic Approach of the Layer Model
    3. Standards and Organisations

    UNIT 3. DATA TRANSMISSION AT THE PHYSICAL LAYER

    1. Role of a network interface
    2. Options and Configuration Settings
    3. Booting from the Network
    4. Data encoding
    5. Signal conversion
    6. Transmission Supports

    UNIT 4. COMMUNICATIONS SOFTWARE

    1. Network card configuration
    2. Network card driver installation and configuration
    3. Protocol stack
    4. Detecting a network problem

    UNIT 5. NETWORK AND INTERCONNECTION ARCHITECTURE

    1. Topologies
    2. Choosing the adapted network topology
    3. Communications Management
    4. Interconnection

    UNIT 6. THE LOWER LAYERS OF PERSONAL AND LOCAL NETWORKS

    1. Lower Layers and IEEE
    2. Ethernet and IEEE 802.3
    3. Token Ring and IEEE 802.5
    4. Wi-Fi and IEEE 802.11
    5. Bluetooth and IEEE 802.15
    6. Other technologies

    UNIT 7. MAN AND WAN NETWORKS: PROTOCOLS

    1. Local network interconnection
    2. Remote access and virtual private networks

    UNIT 8. PROTOCOLS FOR MIDDLE AND UPPER LAYERS

    1. Main protocol families
    2. IP protocol version 4
    3. IP protocol version 6
    4. Other Internet layer protocols
    5. Voice over IP (VoIP)
    6. TCP and UDP transport protocols
    7. TCP/IP application layer

    UNIT 9. PROTECTING A NETWORK

    1. Understanding the need for security
    2. Tools and Types of Attack
    3. Protection Concepts in Local Area Network
    4. Network Interconnection Protection

    UNIT 10. NETWORK REPAIR

    1. Introduction to network repair
    2. Diagnosis in lower layers
    3. Using Adapted TCP/IP Tools
    4. Analysis Tools for Upper Layers

    UNIT 11. SAFE COMMUNICATIONS: LAYERED SECURITY

    1. Security at the Physical Layer
    2. Security at the Data Link Layer
    3. Security at the Network Layer
    4. Security at the Transport Layer
    5. Security at the Application Layer

    UNIT 12. APPLICATION OF A PUBLIC KEY INFRASTRUCTURE (PKI)

    1. Identification of the PKI Components and its Relationship Models
    2. Certificate Authority and its Elements
    3. Certificate Revocation List (CRL)
    4. How certificate signing requests (CSRs) work
    5. Private Management Infrastructures (PMIs)
    6. Attribute Certificate Fields
    7. Applications that rely on the existence of a PKI

    UNIT 13. INTRUSION DETECTION SYSTEMS AND INTRUSION PREVENTION SYSTEMS (IDS/IPS)

    1. General Concepts
    2. Identification and Characterisation of the System Operating Data
    3. Most common IDS architectures
    4. Relation between the Different IDS/IPS
    5. Security Criteria to Establish the Location of the IDS/IPS

    UNIT 14. IMPLEMENTATION AND PRODUCTION OF IDS/IPS

    1. Prior Analysis
    2. Definition of Policies to Cut Off Intrusion Attempts
    3. Analysis of the events recorded by the IDS/IPS
    4. List of Audit Records
    5. Establishment of the Required Levels

    UNIT 15. INTRODUCTION TO THE SIEM SYSTEMS

    1. What Is SIEM?
    2. Evolution of the SIEM Systems
    3. Architecture of a SIEM system

    UNIT 16. SIEM SYSTEMS CAPABILITIES

    1. Problems to solve
    2. Log management
    3. IT Compliance Standards
    4. Event Correlation
    5. SIEM solutions on the market
    Titulación
    Solicitar información