RiskControl Academy

PESC 105 – IP Networks & Cyber Security

Current Status
Not Enrolled
Price
₦***
Get Started
This course is currently closed 3 days

As networks grow and interconnect with other networks including the internet, these networks are exposed to a greater number of security risks. Not only does the number of potential attackers grow along with the size of the network, but the tools available to these potential attackers keep increasing in terms of sophistication. In this module, learners will be introduced to network topology, cybersecurity and its components, and the various threats targeting the network security, surveillance, and physical security systems.

Learning Outcomes

  • Learn how to properly plan, install and correct deficiencies in network communications between components of a video surveillance system
  • Demonstrate an understanding of technical specifications that go into establishing proper network connections for these devices
  • Gain deeper insight on how to set up and utilise a network so that it can function to their advantage
  • Demonstrate understanding of how to configure a router for routing IP
  • Be able to skillfully assign each interface on the router an IP address with a unique subnet
  • Deeply understand and describe the functions and operations of a hub, a switch and a router
  • Properly understand and describe the functions and operations of a firewall and gateway
  • Clearly understand and describe the functions and operations of layer 2 switching, layer 3 switching, and routing
  • Identify the layers of the OSI model
  • Demonstrate and describe the functionality of LAN, MAN, and WAN networks
  • Identify the possible media types for LAN and WAN connections
  • Gain a clear knowledge of the history of fiber optics
  • Develop adequate knowledge of basic optical and electronic components of fiber optics receiver
  • Understand the effects of optical input power
  • Describe the performance characteristics of photodiodes
  • Highlight the performance characteristics of LED and laser receivers
  • Assess the vulnerability of physical security framework to cyber threats