We may earn an affiliate commission when you visit our partners.
Course image
Course image
Coursera logo

كيف تحافظ علي امن اجهزه الشبكات باستخدام Cisco packet Tracer

ahmed elshorafa

ي نهاية المشروع ده هتقدر تبني شبكه من اجهزه الشبكات عن طريق Cisco Packet Tracer. خلال المشروع ده، هتكون قادر على تطبيق مبدأ ال Authentication على ال Router و Switch فى الشبكة ، وجعل الحواسيب الشخصية من VLANs مختلفة الاتصال مع بعضها البعض ، وأخيرا تطبيق بروتوكول DHCP على ال Router وهتكون قادر على حماية مداخل ال Switch من ال attackers.وهذا المشروع موجه للأشخاص المهتمين بالبدء في مجال أمن الشبكات والأشخاص المهتمين بهندسة الشبكات الحاسوبية. وسيعزز هذا المشروع الموجه مهاراتكم في مجال أمن الشبكات لأن ميدان الأمن هو أحد أكثر المجالات الواعدة في السنوات القادمة.

Enroll now

What's inside

Syllabus

ملخص المشروع
في نهاية المشروع ده هتقدر تبني شبكه من اجهزه الشبكات عن طريق Cisco Packet Tracer. خلال المشروع ده، هتكون قادر على تطبيق مبدأ ال Authentication على ال Router و Switch فى الشبكة ، وجعل الحواسيب الشخصية من VLANs مختلفة الاتصال مع بعضها البعض ، وأخيرا تطبيق بروتوكول DHCP على ال Router وهتكون قادر على حماية مداخل ال Switch من ال attackers.

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
مناسب للاشخاص المهتمين بهندسة الشبكات الحاسوبية
يساعدك على بناء شبكة من أجهزة الشبكات
يقدم تجربة عملية في تطبيق مبدأ المصادقة على جهاز التوجيه والمحول
يغطي بروتوكول DHCP
يوفر آلية لحماية مداخل المحول من المهاجمين
موجه للأشخاص المهتمين بالبدء في مجال أمن الشبكات

Save this course

Save كيف تحافظ علي امن اجهزه الشبكات باستخدام Cisco packet Tracer to your list so you can find it easily later:
Save

Reviews summary

Cisco packet tracer networking security

Cisco Packet Tracer Networking Security is a highly rated course that teaches students how to build a network of network devices using Cisco Packet Tracer. Students will learn how to apply the principle of Authentication on the Router and Switch in the network, and how to make personal computers from different VLANs connect with each other. Finally, students will learn how to apply the DHCP protocol on the Router and will be able to protect the entrances of the Switch from attackers.
Students will be able to build a secure network using Cisco Packet Tracer.
".​."
The course is good.
"good"
The course was useful.
"ش​كرا كانت دوره مفيده"
The course is excellent.
"ممتاز"

Activities

Coming soon We're preparing activities for كيف تحافظ علي امن اجهزه الشبكات باستخدام Cisco packet Tracer. These are activities you can do either before, during, or after a course.

Career center

Learners who complete كيف تحافظ علي امن اجهزه الشبكات باستخدام Cisco packet Tracer will develop knowledge and skills that may be useful to these careers:
Network Administrator
Cisco Packet Tracer is a network simulation software that allows you to create and test different network configurations. By understanding how to use this software, you will be able to design, build, and manage networks more effectively. This course will provide you with the skills you need to succeed as a Network Administrator. You will learn how to troubleshoot network issues, configure and manage network devices, and secure networks from threats.
Network Security Analyst
Cisco Packet Tracer can be used to simulate and test network security configurations. This course will teach you how to use this software to identify and mitigate network security risks. You will learn how to configure firewalls, intrusion detection systems, and other security devices. You will also learn how to monitor and analyze network traffic for suspicious activity.
Network Engineer
Cisco Packet Tracer is a valuable tool for Network Engineers. It can be used to design, build, and test network configurations. By understanding how to use this software, you will be able to design and implement more efficient and secure networks. This course will provide you with the skills you need to succeed as a Network Engineer. You will learn how to configure and manage network devices, troubleshoot network issues, and design and implement network security solutions.
Cybersecurity Analyst
Cisco Packet Tracer can be used to simulate and test network security configurations. This course will teach you how to use this software to identify and mitigate network security risks. You will learn how to configure firewalls, intrusion detection systems, and other security devices. You will also learn how to monitor and analyze network traffic for suspicious activity.
IT Security Analyst
Cisco Packet Tracer can be used to simulate and test network security configurations. This course will teach you how to use this software to identify and mitigate network security risks. You will learn how to configure firewalls, intrusion detection systems, and other security devices. You will also learn how to monitor and analyze network traffic for suspicious activity.
Information Security Analyst
Cisco Packet Tracer can be used to simulate and test network security configurations. This course will teach you how to use this software to identify and mitigate network security risks. You will learn how to configure firewalls, intrusion detection systems, and other security devices. You will also learn how to monitor and analyze network traffic for suspicious activity.
Vulnerability Assessor
Cisco Packet Tracer can be used to simulate and test network security configurations. This course will teach you how to use this software to identify and mitigate network security risks. You will learn how to configure firewalls, intrusion detection systems, and other security devices. You will also learn how to monitor and analyze network traffic for suspicious activity.
Information Assurance Analyst
Cisco Packet Tracer can be used to simulate and test network security configurations. This course will teach you how to use this software to identify and mitigate network security risks. You will learn how to configure firewalls, intrusion detection systems, and other security devices. You will also learn how to monitor and analyze network traffic for suspicious activity.
IT Auditor
Cisco Packet Tracer can be used to simulate and test network security configurations. This course will teach you how to use this software to identify and mitigate network security risks. You will learn how to configure firewalls, intrusion detection systems, and other security devices. You will also learn how to monitor and analyze network traffic for suspicious activity.
Network Operations Center (NOC) Analyst
Cisco Packet Tracer is a valuable tool for NOC Analysts. It can be used to monitor and troubleshoot network performance. By understanding how to use this software, you will be able to identify and resolve network issues more quickly and efficiently. This course will provide you with the skills you need to succeed as a NOC Analyst. You will learn how to monitor and troubleshoot network devices, configure and manage network security devices, and analyze network traffic.
Security Engineer
Cisco Packet Tracer can be used to simulate and test network security configurations. This course will teach you how to use this software to identify and mitigate network security risks. You will learn how to configure firewalls, intrusion detection systems, and other security devices. You will also learn how to monitor and analyze network traffic for suspicious activity.
Cloud Security Engineer
Cisco Packet Tracer can be used to simulate and test network security configurations. This course will teach you how to use this software to identify and mitigate network security risks. You will learn how to configure firewalls, intrusion detection systems, and other security devices. You will also learn how to monitor and analyze network traffic for suspicious activity.
Penetration Tester
Cisco Packet Tracer can be used to simulate and test network security configurations. This course will teach you how to use this software to identify and mitigate network security risks. You will learn how to configure firewalls, intrusion detection systems, and other security devices. You will also learn how to monitor and analyze network traffic for suspicious activity.
Forensic Analyst
Cisco Packet Tracer can be used to simulate and test network security configurations. This course will teach you how to use this software to identify and mitigate network security risks. You will learn how to configure firewalls, intrusion detection systems, and other security devices. You will also learn how to monitor and analyze network traffic for suspicious activity.
IT Risk Analyst
Cisco Packet Tracer can be used to simulate and test network security configurations. This course will teach you how to use this software to identify and mitigate network security risks. You will learn how to configure firewalls, intrusion detection systems, and other security devices. You will also learn how to monitor and analyze network traffic for suspicious activity.

Reading list

We've selected nine books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in كيف تحافظ علي امن اجهزه الشبكات باستخدام Cisco packet Tracer.
Provides a comprehensive guide to using Metasploit to perform penetration testing.
Provides a comprehensive overview of web application security, including topics such as SQL injection, cross-site scripting, and session hijacking.
Provides a comprehensive overview of network security monitoring, including topics such as incident detection, response, and forensics.
Provides a comprehensive overview of network security assessment, including topics such as vulnerability scanning, penetration testing, and log analysis.
Provides a comprehensive overview of network security, including topics such as cryptography, firewalls, and intrusion detection systems.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to كيف تحافظ علي امن اجهزه الشبكات باستخدام Cisco packet Tracer.
تعليم مبادئ ال SQL Syntax
Most relevant
أساسيات إعداد واختبار توصيل اجهزة الشبكة الذكي
Most relevant
Working with tcpdump Filters
Most relevant
كيفيه انشاء API call باستخدام PHP and MYSQL
Most relevant
برنامج Power BI للمبتدئين: تصور البيانات
Most relevant
SQL تحسين أداء وضبط أوامر
Most relevant
كتابة وقراءة البيانات الملتقطة في الشبكة باستخدام ...
Most relevant
أساسيات ال Wireshark للمبتدئين
Most relevant
Microsoft Excel تصور البيانات باستخدام
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser