Australia’s largest independent digital media and entertainment company, destra, relies on a robust network for its day-to-day business. Using destra as a case study, this program begins with an overview of computer networks and then introduces issues involving architecture and infrastructure, processes and procedures, maintenance, security, and disaster recovery. An informative illustration of the technological requirements of an e-business leader.
This course will cover key aspects of network and website security. After gaining a basic view of footprinting and vulnerability scanning with the basic video course, you will now dive deep into these concepts. Starting with setting up your own network penetration lab, you take a look network footprinting, where you will learn to scan your network for vulnerabilities. Following this, you will learn various techniques to exploit your network and perform penetration tests using Kali Linux. Shifting focus to websites, you will go through the key techniques of website footprinting and also see how to find vulnerabilities in your website, where you will work with examples of website exploitation. Finally, you will cover injection attacks, a common exploit technique used to detect flaws and breaches in websites.
Computer networks are at the foundation of information and communication technology. A thorough understanding of network design and function is therefore crucial. This program provides a helpful overview of the world of networks for those who are exploring the IT field. Topics include wireless LANs, mobile devices, hardware and software components, wired and wireless protocols, the strengths and limitations of wired and wireless systems, and network security. Whether viewers are embarking on a career in information technology or business, the video is suited to burgeoning professionals who want a better grasp of the infrastructure that drives 21st-century communications. Viewable/printable educational resources are available online.