Network Security
Engineering Academy
Learn Without Limits: Free Engineering Courses
Pre-recorded video course. Watch anytime at your own pace.
FREE
Advanced course for professionals
Anytime Learning
Learn from Industry Expert
Career Option Guideline
Network Security
Why enroll
This course helps participants understand how real-world cyber attacks occur and how networks are compromised, while teaching practical methods to secure systems and protect sensitive data. Through hands-on demonstrations with security tools, learners gain valuable skills for careers in IT and cybersecurity and become more confident in handling modern network security challenges.
Course content
The course is readily available, allowing learners to start and complete it at their own pace.
Network Security
25 Lectures
607 min
Course Introduction - Network Security
Preview
3 min
Introduction to the Course
11 min
Review of Basic Concepts and Terminology in Communication Networks: Part 2
27 min
Motivation and Overview
31 min
Review of Basic Concepts and Terminology in Communication Networks: Part 1
27 min
Review of Basic Concepts and Terminology in Communication Networks: Part 3
21 min
Review of Basic Concepts and Terminology in Communication Networks: Part 4
30 min
Review of Basic Concepts and Terminology in Communication Networks: Part 5
22 min
Review of Basic Concepts and Terminology in Communication Networks: Part 6
30 min
Different Types of Attacks on Networks
32 min
Mathematical Background for Cryptography
31 min
Principle of Cryptography: Part 1
25 min
Principle of Cryptography: Part 2
20 min
Principle of Cryptography: Part 3
31 min
Principle of Cryptography: Part 4
33 min
Principle of Cryptography: Part 5
21 min
Message Integrity, Cryptographic Hash Functions and Digital Signatures: Part 1
26 min
Message Integrity, Cryptographic Hash Functions and Digital Signatures: Part 2
21 min
Message Integrity, Cryptographic Hash Functions and Digital Signatures: Part 3
22 min
Message Integrity, Cryptographic Hash Functions and Digital Signatures: Part 4
27 min
Authentication: Part 1
31 min
Authentication: Part 2
17 min
Authentication: Part 3
20 min
Authentication: Part 4
30 min
Authentication: Part 5
18 min
Course details
This course introduces students to the fundamentals of network security in a clear and practical way. It explains how modern communication networks work and why they are vulnerable to attacks such as hacking, data theft, malware, and denial-of-service attacks. Students will learn how attackers think, the common techniques they use, and how these attacks affect real-world systems like email, web services, online banking, and voice communication.The course covers key security concepts such as encryption, authentication, access control, firewalls, intrusion detection, and secure network protocols. Special emphasis is given to protecting sensitive information like passwords, personal data, and financial details. Along with theory, the course includes hands-on demonstration sessions where students can see security tools and attack–defense techniques in action. By the end of the course, students will have a strong foundation to understand, analyze, and secure computer networks in practical environments.
Source: NPTEL IIT Bombay [Youtube Channel]
Course suitable for
Automotive Electrical Engineering & Design Project Management Research & Developmnet
Key topics covered
Course Introduction – Network Security
Introduction to the Course
Review of Basic Concepts and Terminology in Communication Networks: Part 2
Motivation and Overview
Review of Basic Concepts and Terminology in Communication Networks: Part 1
Review of Basic Concepts and Terminology in Communication Networks: Part 3
Review of Basic Concepts and Terminology in Communication Networks: Part 4
Review of Basic Concepts and Terminology in Communication Networks: Part 5
Review of Basic Concepts and Terminology in Communication Networks: Part 6
Different Types of Attacks on Networks
Mathematical Background for Cryptography
Principle of Cryptography: Part 1
Principle of Cryptography: Part 2
Principle of Cryptography: Part 3
Principle of Cryptography: Part 4
Principle of Cryptography: Part 5
Message Integrity, Cryptographic Hash Functions and Digital Signatures: Part 1
\Message Integrity, Cryptographic Hash Functions and Digital Signatures: Part 2
Message Integrity, Cryptographic Hash Functions and Digital Signatures: Part 3
Message Integrity, Cryptographic Hash Functions and Digital Signatures: Part 4
Authentication: Part 1
Authentication: Part 2
Authentication: Part 3
Authentication: Part 4
Authentication: Part 5
FREE
Access anytime