Premium Course

Fundamentals of Networking Concepts, Protocols, and Security

Gain a solid understanding of the network protocols, technologies, and concepts.

Course Overview

Network Protocols are a set of guidelines governing the exchange of information in a simple, dependable and secure way. Network protocols are formal standards and policies comprised of rules, methodology, and configurations that define communication between two or more devices over a network. This course is designed to help understand the purpose and use of various networking protocols.  

The course will start with a basic introduction to networking and its protocols. Then you will explore the network protocol suites which include the OSI model and TCP/IP Model. Further, in this course, you will understand the role and function of networking devices and network topologies. Next, you will explore the routing and switching concepts after which you’ll learn how to create a network penetration lab and perform network penetration testing techniques. Finally, you’ll understand the need for device security and hardening.

By the end of this course, you will be able to describe common network protocols and their purpose, you will know about the routing and switching concepts, and understand how networking devices make their forwarding decisions. You will also be able to describe various network topologies and describe how traffic flows from a source to a destination.

What You Will Learn

Inside the Course

7 Lessons | 37 Topics | 4 Quizzes

Course Content

Expand All

Start Learning for as Little As $8 a Month!

Start Your FREE Two Week Trial

We are working day and night to bring you fresh courses every month. And we have brand new features in the works like guided career paths, hands-on labs and experiences, dedicated mentors, cyber range integration and so much more.

Related Courses

Implementing and Administering Cisco Solutions: CCNA 200-301

Gain the core skills within the field of Network Engineering to design, configure, troubleshoot and secure enterprise networks.

Getting Started with Kali Linux Penetration Testing

Learn how to to use Kali Linux tools for vulnerability analysis from this hands-on course

Wireless Pentesting with the Raspberry Pi

Learn about Raspberry Pi and various network scenarios such as wireless security and network scanning

Identity and Access Management

Understand the key areas and fundamental concepts of IAM along with the different approaches for implementing effective IAM

« » page 1 / 13

Subscribe & Start Learning

This course is part of our Premium collection of courses. This package is perfect for professionals and teams looking to take their skills to the next level. Gain access to a wide range of sophisticated courses.

Subscribe & Start Learning

Our Basic plan is perfect for students taking their first steps into leadership, IT management, or cybersecurity. Get comfortable. Feel it out. Learn what you love and what you don’t love. Start learning today with a 7 Day Free Trial!