Course in Computer Networks: Architecture, Protocols, and Cybersecurity
100% Online
200 horas
260€

    Course in Computer Networks: Architecture, Protocols, and Cybersecurity

    100% Online
    200 horas
    260€
    Seguridad y confianza en tus pagos online.

    Presentación

    In today's digital landscape, the demand for expertise in computer networks is soaring. The Course in Computer Networks: Architecture, Protocols, and Cybersecurity is your gateway to mastering this dynamic field. Immerse yourself in the essential concepts and cutting-edge practices that define network architecture and protocols. In an era where cybersecurity threats are ever-evolving, understanding how to protect and secure networks is crucial. This course empowers you with the skills to design robust networks, implement effective protocols, and ensure cybersecurity resilience. As businesses increasingly rely on digital infrastructure, your expertise will be indispensable. Position yourself at the forefront of this high-demand sector, where opportunities abound, and become a sought-after professional in an industry that shapes the future. Join us online and transform your career potential.
    Qs World University Rankings

    Universidades colaboradoras

    Para qué te prepara
    This course equips you with the skills to design and manage complex computer networks, understand and implement various network protocols, and bolster cybersecurity measures. By the end, you'll be able to analyse network architectures, troubleshoot connectivity issues, and apply security practices to protect data integrity and privacy. This knowledge enables you to enhance network efficiency and security in professional settings.
    Objetivos
    - To understand the architecture of computer networks in various environments. - To identify and explain key network protocols and their functions. - To analyse network security threats and propose solutions. - To evaluate different network topologies and their applications. - To compare the features of wired and wireless communication networks. - To explore the role of cybersecurity in network management. - To interpret network performance metrics for optimisation.
    A quién va dirigido
    This course is designed for professionals and graduates in the field of computer science and IT who are keen to expand or update their knowledge in computer networks. Ideal for those interested in understanding network architecture, protocols, and cybersecurity measures, it offers valuable insights without being overly complex, making it accessible to a broad audience.
    Salidas Profesionales
    - Network Architect: Design and implement robust network infrastructures. - Cybersecurity Analyst: Protect systems from cyber threats and vulnerabilities. - Network Administrator: Manage and maintain organisational networks. - Protocol Developer: Create and optimise communication protocols. - IT Consultant: Advise on network and security solutions for businesses.
    Temario

    UNIT 1. INTRODUCTION TO THE NETWORK

    1. Main elements of a network
    2. Network technology
    3. Support for business continuity

    UNIT 2. PROTOCOL STANDARDISATION

    1. OSI Model
    2. Pragmatic Approach of the Layer Model
    3. Standards and Organisations

    UNIT 3. DATA TRANSMISSION AT THE PHYSICAL LAYER

    1. Role of a network interface
    2. Options and Configuration Settings
    3. Booting from the Network
    4. Data encoding
    5. Signal conversion
    6. Transmission Supports

    UNIT 4. COMMUNICATIONS SOFTWARE

    1. Network card configuration
    2. Network card driver installation and configuration
    3. Protocol stack
    4. Detecting a network problem

    UNIT 5. NETWORK AND INTERCONNECTION ARCHITECTURE

    1. Topologies
    2. Choosing the adapted network topology
    3. Communications Management
    4. Interconnection

    UNIT 6. THE LOWER LAYERS OF PERSONAL AND LOCAL NETWORKS

    1. Lower Layers and IEEE
    2. Ethernet and IEEE 802.3
    3. Token Ring and IEEE 802.5
    4. Wi-Fi and IEEE 802.11
    5. Bluetooth and IEEE 802.15
    6. Other technologies

    UNIT 7. MAN AND WAN NETWORKS: PROTOCOLS

    1. Local network interconnection
    2. Remote access and virtual private networks

    UNIT 8. PROTOCOLS FOR MIDDLE AND UPPER LAYERS

    1. Main protocol families
    2. IP protocol version 4
    3. IP protocol version 6
    4. Other Internet layer protocols
    5. Voice over IP (VoIP)
    6. TCP and UDP transport protocols
    7. TCP/IP application layer

    UNIT 9. PROTECTING A NETWORK

    1. Understanding the need for security
    2. Tools and Types of Attack
    3. Protection Concepts in Local Area Network
    4. Network Interconnection Protection

    UNIT 10. NETWORK REPAIR

    1. Introduction to network repair
    2. Diagnosis in lower layers
    3. Using Adapted TCP/IP Tools
    4. Analysis Tools for Upper Layers

    UNIT 11. SAFE COMMUNICATIONS: LAYERED SECURITY

    1. Security at the Physical Layer
    2. Security at the Data Link Layer
    3. Security at the Network Layer
    4. Security at the Transport Layer
    5. Security at the Application Layer

    UNIT 12. APPLICATION OF A PUBLIC KEY INFRASTRUCTURE (PKI)

    1. Identification of the PKI Components and its Relationship Models
    2. Certificate Authority and its Elements
    3. Certificate Revocation List (CRL)
    4. How certificate signing requests (CSRs) work
    5. Private Management Infrastructures (PMIs)
    6. Attribute Certificate Fields
    7. Applications that rely on the existence of a PKI

    UNIT 13. INTRUSION DETECTION SYSTEMS AND INTRUSION PREVENTION SYSTEMS (IDS/IPS)

    1. General Concepts
    2. Identification and Characterisation of the System Operating Data
    3. Most common IDS architectures
    4. Relation between the Different IDS/IPS
    5. Security Criteria to Establish the Location of the IDS/IPS

    UNIT 14. IMPLEMENTATION AND PRODUCTION OF IDS/IPS

    1. Prior Analysis
    2. Definition of Policies to Cut Off Intrusion Attempts
    3. Analysis of the events recorded by the IDS/IPS
    4. List of Audit Records
    5. Establishment of the Required Levels

    UNIT 15. INTRODUCTION TO THE SIEM SYSTEMS

    1. What Is SIEM?
    2. Evolution of the SIEM Systems
    3. Architecture of a SIEM system

    UNIT 16. SIEM SYSTEMS CAPABILITIES

    1. Problems to solve
    2. Log management
    3. IT Compliance Standards
    4. Event Correlation
    5. SIEM solutions on the market
    Titulación
    Claustro

    Rafael Marín Sastre

    Ingeniero técnico en informática de sistemas por la Universidad de Granada (UGR).  

    Apasionado de la informática y de las nuevas tecnologías, cuenta con 10 años de experiencia y vocación en el ámbito TIC y la programación de software. Es experto en desarrollo web, programación de aplicaciones, análisis de datos, big data, ciberseguridad y diseño y experiencia de usuario (UX/UI). 

    Alan Sastre

    Ocupa el puesto de CTO (Chief Technology Officer) y formador. Diseña e imparte formación en diferentes áreas como desarrollo web, bases de datos, big data, business intelligence y ciencia de datos. Además, trabaja diaramente con las tecnologías del ecosistema Java, C# y Phyton.

    Dani Pérez Lima

    Global IT support manager de una multinacional con más de 20 años de experiencia en el mundo IT, además de un apasionado de la virtualización de sistemas y de la transmisión de conocimiento en el ámbito de la tecnología.

    José Domingo Muñoz Rodríguez

    Ingeniero informático, profesor de secundaria de ASIR y coorganizador de OpenStack Sevilla con dilata experiencia en sistemas GNU/Linux. Administra clouds públicos y gestiona un cloud privado con OpenStack.

    Juan Benito Pacheco

    Como tech lead, ayuda a organizaciones a escalar sus servicios e infraestructura. Lleva más de 5 años programando tanto en front-end como back-end con JavaScript, Angular, Python o Django, entre otras tecnologías.

    Juan Diego Pérez Jiménez

    Profesor de Ciclos Formativos de Grado Superior de Informática. Más de 10 años creando páginas web y enseñando cómo hacerlas, cómo usar bases de datos y todo lo relacionado con la informática.

    Solicitar información