Cybersecurity of Computer Networks Course

الأمن السيبرانى لشبكات الحاسبات والمعلومات

USD 106
USD 64


03:57:48 hours


Access Time






Skill Level
( General - Specialized )

USD 106
USD 64

About IGTS

Since the launch of IGTS in 2015, the main objective has been to support training and qualification in the health sector in its various categories. The group has thus sought to provide scientific and practical expertise from the largest medical experts in the Arab world, who we were honored to be part of the IGTS family. As a result of the success achieved by the group, we have focused on expanding in areas no less important than the health sector. Among these are business management - education and guidance - mental health - human resources - and others, more that are commensurate with the needs of human cadres and with the quality of learning that is a major start for every aspiration to receive science and self-development. The most important element of the IGTS strategy was the contracting of a group of experts, all of the members of teaching bodies in the largest Arab universities in all specialties, who believed in the science they provided and sought to research and develop it, in order to transfer the greatest amount of it to the student and make it most useful, through a flexible distance-learning method and in direct contact with the lecturer.

Cybersecurity is a set of practices and technologies designed to protect information and systems from cyberattacks. These attacks include stealing, manipulating, disabling or destroying data.

Cyber attacks can lead to:

  • Stealing personal data, such as credit card numbers or email addresses
  • Stealing intellectual property, such as patents or designs
  • Disable business processes, such as disabling websites or computer systems
  • Damage to critical infrastructure, such as power grids or transportation systems

There are many things individuals, companies, and governments can do to improve their cybersecurity. These actions include:

  • Use different strong passwords for each account
  • Update programs and applications regularly
  • Install anti-virus and anti-malware software
  • Conduct cybersecurity training for employees

Cybersecurity is critical to protecting critical information and systems. Through this course you will learn all the solutions to protect and secure information. Subscribe now

You Will Learn

  • Safe design of computer and information networks
    Securing virtual networks for computers and information
    Firewall to protect networks
    Scanning the exits of networks and the devices on them
    Eavesdropping on computer and information networks
    Intrusion detectors for computer and information networks
    He also acquires the ability to:
    Develop and implement a secure design for computer and information networks
    Setting and operating firewalls on computer and information networks
    Dealing with network gaps and vulnerabilities of computer and information networks
    Confronting eavesdropping on computer and information networks
    Addressing computer and information network penetrations

    Part one: Introduction to computer and information networks
    First lecture: What are computer networks?
    The second lecture: ways to connect computer networks
    Third lecture: Types of computer networks
    The fourth lecture: computer network devices and services
    Fifth Lecture: Signal carriers in computer networks

    Part Two: The ISO Model for Computer Networks
    First lecture: Why the ISO model?
    The second lecture: the seventh, sixth and fifth layers of the ISO model
    The third lecture: the fourth and third layers of the ISO model
    Fourth Lecture: The second and first layers of the ISO model
    The fifth lecture: the interaction of the layers of the ISO model of computer networks

    Part three: TCP/IP protocol
    First lecture: Introduction to computer network protocols
    Second lecture: IP protocol
    Third lecture: TCP and UDP protocols
    Fourth lecture: Applied protocols
    Fifth lecture: TCP / IP commands and programs

    Chapter Four: Wireless Networks
    First lecture: Benefits of wireless communication
    Second lecture: Types of wireless networks
    Third Lecture: Wireless Networking Protocol
    Fourth lecture: wireless network devices
    Fifth Lecture: Disadvantages and Disadvantages of Wireless Networks
    The scientific material includes both the theoretical and practical aspects necessary to achieve the educational objective

Targeted Students

1- Network administrators
2- Network security officials
3 IT professionals

Training Program Name As In Certificate

Cybersecurity of Computer Networks Course

Created at: 2022-07-20 10:36:32
Updated at: 2024-06-21 17:04:35


Dr. Mohamed Adly
Academic and professional degrees: Ph. D. , M. Sc. ,and B. Sc. Electronic Engineering
A team of instructors who are the best in their fields
The continuous development of our educational materials
Lifetime access for the courses that you purchase
Evaluate yourself through a test that you can take after each level in
Easy communication between you and the instructors directly through your account
We have presence in more than 22 countries in the Middle East and North Africa
Our content is provided in the Arabic language with an easy-to-use platform
A team of customer services who are working 24/7
Lowest cost and highest quality of supervised educational materials
More than one accreditation from local and international education institutions
64 USD