seela logo

Infrastructure Networks

Discover the stakes around the network infrastructures allowing the transport of information: transmission and reception chains of mobile, radio or satellite communication networks.

LAN Security Concepts

5 Lessons - 95 min

Welcome to this course on LAN security concepts!

If your career path is in IT, you won't just be building or maintaining networks. You will be responsible for the security of your network. For today's network architects and administrators, security is not an afterthought. It is a top priority for them! In fact, many IT professionals now work exclusively in network security.

Do you understand what makes a LAN secure? Do you know what threats actors can make to break network security? Do you know what you can do to stop them? This module is your introduction to the world of network security.

01. Terminal security

15 minutes

An introduction to cybersecurity

The news media typically covers attacks on corporate networks. Simply search the Internet for "latest network attacks" to find up-to-date information on current attacks. Likely, these attacks will involve one or more of the following:

Distributed Denial of Service (DDoS ) - A coordinated attack on multiple devices, called zombies, with the goal of degrading or disrupting public access to an organization's website and resources.

Data breach - An organization's data servers or hosts are compromised to steal confidential information.

Malware - An organization's hosts are infected with malware that causes various problems. For example, ransomware such as WannaCry, shown in the figure, encrypts data on a host and locks out access until a ransom is paid.

QUIZ. Terminal security

5 min

An introduction to cybersecurity

03. Access control 

15 minutes

An introduction to cybersecurity

QUIZ. Access control

5 min

An introduction to cybersecurity

05. Threats to level security

10 min.

An introduction to cybersecurity

QUIZ. Threats to level security

5 min

An introduction to cybersecurity

07. Attacks on MAC address tables

10 min.

An introduction to cybersecurity

QUIZ. Attacks on MAC address tables

5 min

An introduction to cybersecurity

09. LAN attacks

20 minutes

An introduction to cybersecurity

QUIZ. LAN attacks

5 min

An introduction to cybersecurity

Switch security configuration

3 Lessons - 65 min

Your responsibility as a network professional is to ensure network security. Most of the time, we only think about security attacks from outside the network, but threats can also come from within. These threats come in many forms: an employee quietly adding an Ethernet switch to the corporate network to gain more ports, a malicious attack by a disgruntled employee...

How to keep the network secure and stable? How do we protect it from malicious attacks within the network? How can we ensure that employees do not add switches, servers and other devices to the network that could compromise network operations?

This course is an introduction to securing the network from the inside.

01. Implementation of port security 

15 minutes

An introduction to cybersecurity

02. Mitigate VLAN & DHCP attacks

20 minutes

An introduction to cybersecurity

03. Mitigate ARP & STP attacks

20 minutes

An introduction to cybersecurity

QUIZ. Switch security configuration

10 min.

An introduction to cybersecurity

WLAN concepts

7 Lessons - 145 min

Welcome to WLAN Concepts!

Do you use a wireless connection at home, at work or at school? Have you ever wondered how it works?

There are many ways to connect wirelessly. Like anything else involving networks, these types of connections are best used in specific situations. They require specific devices and are also subject to certain types of attacks. And of course, there are solutions to mitigate these attacks. Want to learn more? The WLAN Concepts module gives you the fundamental knowledge you need to understand what wireless LANs are, what they can do and how to protect them.

If you are curious, don't wait, start today!

01. Introduction to Wireless

25 min

An introduction to cybersecurity

QUIZ. Introduction to Wireless

5 min

An introduction to cybersecurity

03. Components of a Wireless Local Area Network

20 minutes

An introduction to cybersecurity

QUIZ. Components of a wireless local area network

5 min

An introduction to cybersecurity

05. Operation of a Wireless Local Area Network 

20 minutes

An introduction to cybersecurity

QUIZ. How does a wireless local area network work? 

5 min

An introduction to cybersecurity

07. Operation of the CAPWAP Protocol

10 min.

An introduction to cybersecurity

QUIZ. How the CAPWAP Protocol works

5 min

An introduction to cybersecurity

09. Channel Management

20 minutes

An introduction to cybersecurity

QUIZ. Channel Management

5 min

An introduction to cybersecurity

11. Threats to wireless LANs

15 minutes

An introduction to cybersecurity

QUIZ. Threats to wireless LANs

5 min

An introduction to cybersecurity

13. Threats to a wireless LAN

20 minutes

An introduction to cybersecurity

QUIZ. Threats to a wireless LAN

5 min

An introduction to cybersecurity

WLAN configuration

4 Lessons - 95 min

Welcome to the Wireless LAN (WLAN) configuration module!

Today, we can connect to the internet using wireless devices that allow us to use our phones, laptops and tablets almost anywhere. It's great to have this freedom of movement, but it requires special and intermediate end devices and understanding of wireless protocols. Want to learn more? Then this module is for you!

01. Remote site WLAN configuration

30 min.

An introduction to cybersecurity

02. Basic WLAN configuration on WLC 

25 min

An introduction to cybersecurity

03. Configuring WPA2-Enterprise of a WLAN on the WLC

25 min

An introduction to cybersecurity

04. Troubleshooting WLAN problems

15 minutes

An introduction to cybersecurity

QUIZ. WLAN configuration

5 min

An introduction to cybersecurity

Mobile network security

5 Lessons - 160 min

When you're on the road, your agility and availability rely heavily on your mobile devices, such as smartphones, tablets and laptops. While convenient, these tools can pose a significant threat to your organization's security if appropriate levels of security are not associated with each user.

01. Introduction to the course

An introduction to cybersecurity

02. Introduction to mobile network security 

30 min.

An introduction to cybersecurity

03. Security of 2G mobile networks

40 minutes

An introduction to cybersecurity

04. Security of 3G mobile networks

40 minutes

An introduction to cybersecurity

05. Mobile Network SecurityG 

50 min

An introduction to cybersecurity

Optical fiber

2 Lessons - 30 min

An optical fiber is a wire with a very thin glass or plastic core that conducts light and is used for fiberscopy, lighting or digital data transmission.

01. Introduction to the course

An introduction to cybersecurity

02. Fiber Optic Transmission

30 min.

An introduction to cybersecurity

Theory of satellite communications

4 Lessons - 45 min

In 60 years: More than 6000 satellites and probes and manned spacecraft launched.

01. Introduction to the course

An introduction to cybersecurity

02. Basics of satellite transmissions

20 minutes

An introduction to cybersecurity

03. Propagation of electromagnetic waves

15 minutes

An introduction to cybersecurity

04. Regulations and use of the waves

10 min.

An introduction to cybersecurity

Transmission chain

6 Lessons - 110 min

A transmission channel comprises a support on which the information is incorporated after coding by modulation. A transmission chain has several elements: a source, a transmission channel which is a physical process, and a receiver.

01. Introduction to the course

An introduction to cybersecurity

02. Satellite communication networks

25 min

An introduction to cybersecurity

03. Description of a VSAT

15 minutes

An introduction to cybersecurity

04. The antennas

30 min.

An introduction to cybersecurity

05. The broadcast chain

20 minutes

An introduction to cybersecurity

06. The reception chain

20 minutes

An introduction to cybersecurity

Signal Processing

7 Lessons - 275 min

Basic principles of signal processing.

01. Introduction to the course

An introduction to cybersecurity

02. Theory of information

60 minutes

An introduction to cybersecurity

03. Digital communications

20 minutes

An introduction to cybersecurity

04. Scanning

60 minutes

An introduction to cybersecurity

05. Baseband modulation

45 minutes

An introduction to cybersecurity

06. Modulation on carrier

45 minutes

An introduction to cybersecurity

07. Power Spectral Density

45 minutes

An introduction to cybersecurity

Mail

information@seela.io