RiskControl Academy

PESC105- IP Networks & Cyber Security

Current Status
Not Enrolled
Get Started
This course is currently closed 3 days

As networks grow and interconnect with other networks, including the Internet, those networks are exposed to a greater number of security risks. Not only does the number of potential attackers grow along with the size of the network, but the tools available to those potential attackers are always increasing in terms of sophistication. In this Module, you will be aware of Network Topology, Cybersecurity and its components, and the various threats targeting the security of your network, surveillance, and physical security systems.

Learning Outcomes

  • Learn how to properly plan, install and correct deficiencies in network communications between components of a video surveillance system.
  • Demonstrate understanding of technical specifications that go into establishing proper network connections for these devices.
  • Demonstrate understanding how to set up and utilize a network so that it can function to their advantage.
  • Demonstrate understanding of how to configure a router for routing IP
  • Be able to skillfully assign each interface on the router an IP address with a unique subnet
  • Demonstrate understanding and describe the function and operation of a hub, a switch, and a router
  • Demonstrate understanding and describe the function and operation of a firewall and a gateway
  • Demonstrate understanding and describe the function and operation of Layer 2 switching, Layer 3 switching, and routing
  • Identify the layers of the OSI model
  • Demonstrate understanding and describe the functionality of LAN, MAN, and WAN networks
  • Identify the possible media types for LAN and WAN connections
  • History of Fiber Optics
  • Basic optical and electronic components of fiber optics receiver
  • Effects of optical input power
  • Performance characteristics of photodiodes
  • Performance characteristics of LED and Laser receivers
  • The vulnerability of physical security framework to cyber threats