17 Sections
56 Lessons
Lifetime
Expand all sections
Collapse all sections
Part A: Computer Networking
0
Module 1: Introduction to Networking
5
2.1
1.1What is networking and why it matters
2.2
1.2 Types of networks (LAN, WAN, WLAN, MAN)
2.3
1.3 Network topologies (bus, star, ring, mesh)
2.4
1.4 Common networking devices (router, switch, hub, modem, access point)
2.5
1.5 Quiz – Module 1: Introduction to Networking
15 Minutes
10 Questions
Module 2: Networking Basics
5
3.1
2.1 IP addressing (IPv4 & IPv6 basics)
3.2
2.2 Subnetting (simplified for beginners)
3.3
2.3 MAC addresses and ARP
3.4
2.4 Understanding ports and protocols (TCP, UDP, HTTP, DNS, DHCP, FTP, etc.)
3.5
2.5 Quiz – Module 2: Networking Basics
15 Minutes
10 Questions
Module 3: Network Hardware & Cabling
5
4.1
3.1 Types of cables (Ethernet, coaxial, fiber optic)
4.2
3.2 Crimping RJ45 connectors (straight-through & crossover cables)
4.3
3.3 Patch panels, racks, and structured cabling basics
4.4
3.4 Wireless networking fundamentals (WiFi standards, access points)
4.5
3.5 Quiz – Module 3: Network Hardware & Cabling
15 Minutes
10 Questions
Module 4: Configuring & Managing Networks
5
5.1
4.1 Setting up a basic home/office network
5.2
4.2 Configuring routers, switches, and firewalls (entry-level)
5.3
4.3 DHCP and static IP assignments
5.4
4.4 Sharing files, printers, and resources in a LAN
5.5
4.5 Module 4: Configuring & Managing Networks – Quiz
15 Minutes
10 Questions
Module 5: Network Troubleshooting
5
6.1
5.1 Common network issues and solutions
6.2
5.2 Basic commands (ping, tracert, ipconfig, netstat)
6.3
5.3 Network monitoring tools (Wireshark basics)
6.4
5.4 Documentation and reporting
6.5
5.5 Module 5: Network Troubleshooting – Quiz
15 Minutes
10 Questions
Part B: Cybersecurity
0
Module 6: Introduction to Cybersecurity
5
8.1
6.1 What is cybersecurity and why it matters
8.2
6.2 Types of cyber threats (malware, phishing, hacking, insider threats)
8.3
6.3 CIA Triad (Confidentiality, Integrity, Availability)
8.4
6.4 Cybersecurity roles and career paths
8.5
6.5 Introduction to Cybersecurity – Quiz
15 Minutes
10 Questions
Module 7: Securing Networks
5
9.1
7.1 Firewalls and intrusion detection/prevention systems
9.2
7.2 Antivirus and endpoint protection
9.3
7.3 Secure WiFi configuration (WPA3, disabling WPS, MAC filtering)
9.4
7.4 Importance of software updates and patch management
9.5
7.5 Securing Networks – Quiz
15 Minutes
10 Questions
Module 8: Cyber Attacks & Defenses
6
10.1
8.1 Common attacks: phishing, ransomware, DoS/DDoS, MITM (Man-in-the-Middle)
10.2
8.2 Password attacks and brute force
10.3
8.3 Social engineering techniques hackers use
10.4
8.4 Defense strategies against each type of attack
10.5
8.5 Network Attack
10.6
8.6 Cyber Attacks & Defenses – Quiz
15 Minutes
10 Questions
Module 9: Cyber Hygiene & Best Practices
5
11.1
9.1 Strong password policies and multi-factor authentication (MFA)
11.2
9.2 Safe browsing and email security
11.3
9.3 Data backup and recovery basics
11.4
9.4 Mobile device security
11.5
9.5 Cyber Hygiene & Best Practices – Quiz
15 Minutes
10 Questions
Module 10: Ethical Hacking & Penetration Testing (Beginner Level)
5
12.1
10.1 What is ethical hacking?
12.2
10.2 Reconnaissance & scanning basics
12.3
10.3 Introduction to penetration testing tools (Nmap, Wireshark, Kali Linux basics)
12.4
10.4 Legal and ethical considerations
12.5
10.4 Ethical Hacking & Penetration Testing – Quiz
15 Minutes
10 Questions
Module 11: Incident Response & Malware Analysis
6
13.1
11.1 What is incident response?
13.2
11.2 Steps: Preparation, detection, containment, eradication, recovery
13.3
11.3 Malware types (viruses, worms, trojans, ransomware, spyware)
13.4
11.4 Antimalware
13.5
11.5 Hands-on: Analyzing simple malware behavior
13.6
11.6 Incident Response & Malware Analysis – Quiz
15 Minutes
10 Questions
Module 12: Governance, Risk & Compliance (GRC)
5
14.1
12.1 Introduction to IT policies and compliance (GDPR, ISO, NIST basics)
14.2
12.2 Risk management in cybersecurity
14.3
12.3 Incident response process (detect → respond → recover)
14.4
12.4 Reporting and documentation in cybersecurity
14.5
12.5 Governance, Risk & Compliance (GRC) – Objective Questions
15 Minutes
10 Questions
Module 13: 🔍 Network Forensics (Newly Added)
6
15.1
13.1 Introduction to Network Forensics
15.2
13.2 Capturing Traffic
15.3
13.3 Analyzing Traffic
15.4
13.4 Hands-On Practice
15.5
13.5 Case Study Example
15.6
13.6 Network Forensics – Objective Questions
15 Minutes
10 Questions
Interview Questions and Conclusion
1
16.1
Interview Questions
Project Works
1
17.1
Project Work
3 Days
System Networking & Cybersecurity Combo Course (For Beginners)
Curriculum
This content is protected, please
login
and enroll in the course to view this content!
Login with your site account
Lost your password?
Remember Me
Modal title
Main Content