| Code | Topic | Material |
| L1 | The Concept of Network Security and its Essence | Download |
| L2 | Modern Threats to Network Security | Download |
| L3 | Security Policy in Computer Systems and Networks | Download |
| L4 | Network Security Standards (Oz DSt ISO/IEC 27033) | Download |
| L5 | OSI and TCP/IP Models | Download |
| L6 | Information Protection Infrastructure at the Application and Presentation Levels | Download |
| L7 | Protocols for Forming Secure Channels at the Channel and Session Levels | Download |
| L8 | Data Protection at the Transport Layer | Download |
| L9 | Data Protection at the Network Level | Download |
| L10 | Protecting a Computer Network at the Physical Level | Download |
| L11 | Remote Attacks on Computer Networks | Download |
| L12 | Fundamentals of Protected Virtual Network Technologies | Download |
| L13 | Network Display Technologies | Download |
| L14 | Detecting and Eliminating Attacks | Download |
| L15 | Information Security in Cloud Computing Systems | Download |
| Code | Topic | Material |
| P1 | Setting up Initial Security Settings on Network Devices — Telnet, SSH | Download |
| P2 | Port Security on Switches Setup | Download |
| P3 | Reservation Protocols — STP, PVSTP and Aggregation Protocols — LACP, PAgP Setup | Download |
| P4 | VTP Protocol Setup | Download |
| P5 | OSPF, RIP, EIGRP and BGP Protocols Based on Dynamic Routing Setup | Download |
| P6 | ACL List Settings (Standard, Extended) | Download |
| P7 | NAT/PAT Technology in Routers Setup | Download |
| P8 | Network DMZ on Your Router Installation | Download |
| P9 | Enterprise and Organization Information Communication VPN Network in Systems Build | Download |
| # | Reference |
| 1 | 22 years of the President of the Republic of Uzbekistan 28 Decree No. PF-60 of January 2022 "On the Development Strategy of the New Uzbekistan for 2022–2026". |
| 2 | Mirziyoyev Sh.M. The rule of law and ensuring human interests are the key to the development of the country and the well-being of the people. 2017. |
| 3 | Tim Boyles. CCNA Security Study Guide. Copyright © 2010 by Wiley Publishing, Inc., Indianapolis, Indiana. ISBN: 978-0-470-52767-2. |
| 4 | Mark Ciampa. Security+ Guide to Network Security Fundamentals. Fifth Edition. |
| 5 | Emad S. Hassan. Security and Data Reliability in Cooperative Wireless Networks. © 2018 by Taylor & Francis Group, LLC. |
| 6 | William Stallings. Cryptography and Network Security Principles and Practice. Fifth Edition. © 2011, 2006 Pearson Education, Inc., Prentice Hall. |
| 7 | Joseph Migga Kizza. Computer Network Security and Cyber Ethics. Fourth Edition. McFarland & Company, Inc., Publishers Jefferson, North Carolina © 2014. |