Home
Company
About us
Career
Membership Plan
FAQs
Franchise
Services
Blog
Student
Testimonial
Success Stories
Personality Development
Certificate
Verification
Events & Workshops
Events
Event Details
Placement
Internship Programs
Placement Assistance
Hiring Partners
Contact
+918601030795
contact@drdsecurity.com
Mon - Sat: 10:00 Am- 6:00 Pm
Login / Register
Home
Company
About us
Career
Membership Plan
FAQs
Franchise
Services
Blog
Student
Testimonial
Success Stories
Personality Development
Certificate
Verification
Events & Workshops
Events
Event Details
Placement
Internship Programs
Placement Assistance
Hiring Partners
Contact
Categories
Free Cyber Security
Air Force
Army courses
Navy Courses
Cyber Terrorism Courses
Corporate Courses
EC-Council
Master Courses
Law Enforcement
Red Teaming Courses
Blue Teaming Courses
Purple Teaming Courses
Digital Forensics
Red Hat Courses
Programming Courses
Darkweb Courses
Offensive Security
CISCO/ Networking Courses
Ethical Hacking Courses
Comptia Courses
Cloud & DevSecOps
ISC
ISACA
Reverse Engineering
0
0
Contact us
Ports and Services (HTTP, HTTPS, FTP, SSH)
Home
Lesson
Ports and Services (HTTP, HTTPS, FTP, SSH)
Course Content
Module 1: Introduction to Network Security
0/5
What is Network Security?
Importance of Cybersecurity in Modern Networks
Types of Cyber Threats (Malware, Phishing, DoS)
CIA Triad (Confidentiality, Integrity, Availability)
Real-World Cyber Attacks (Case Studies)
Module 2: Networking Fundamentals for Security
0/5
OSI Model Explained (Security Perspective)
TCP/IP Model and Protocols
IP Addressing & Subnetting Basics
Common Network Devices (Router, Switch, Firewall)
Ports and Services (HTTP, HTTPS, FTP, SSH)
Module 3: Threats, Attacks & Vulnerabilities
0/5
Types of Network Attacks (MITM, DoS, DDoS)
Malware Types (Virus, Worm, Trojan, Ransomware)
Social Engineering Attacks
Vulnerabilities and Exploits
Introduction to CVE & Security Databases
Module 4: Network Security Devices & Controls
0/5
Firewalls (Types and Working)
IDS vs IPS
Proxy Servers
Network Access Control (NAC)
Endpoint Security Basics
Module 5: Encryption & Secure Communication
0/5
Basics of Cryptography
Symmetric vs Asymmetric Encryption
SSL/TLS and HTTPS
VPN (Types and Use Cases)
Public Key Infrastructure (PKI)
Module 6: Network Monitoring & Tools
0/5
Introduction to Network Monitoring
Packet Analysis using Wireshark
Network Scanning with Nmap
Log Analysis Basics
SIEM Overview
Module 7: Secure Network Design
0/5
Network Segmentation
DMZ (Demilitarized Zone)
Zero Trust Security Model
Secure Wireless Networks
Best Practices for Network Hardening
Module 8: Incident Response & Best Practices
0/5
What is Incident Response?
Steps in Incident Handling
Risk Management Basics
Backup and Recovery
Security Policies & Awareness
Network Security
Please complete previous Lesson first
Common Network Devices (Router, Switch, Firewall)
Back to Lesson