Connect and Protect: Networks and Network Security
- Offered byCoursera
Connect and Protect: Networks and Network Security at Coursera Overview
Duration | 14 hours |
Start from | Start Now |
Total fee | Free |
Mode of learning | Online |
Difficulty level | Beginner |
Official Website | Explore Free Course |
Credential | Certificate |
Connect and Protect: Networks and Network Security at Coursera Highlights
- Flexible deadlines Reset deadlines in accordance to your schedule.
- Shareable Certificate Earn a Certificate upon completion
- 100% online Start instantly and learn at your own schedule.
- Coursera Labs Includes hands on learning projects. Learn more about Coursera Labs External Link
- Beginner Level
- Approx. 14 hours to complete
- English Subtitles: English
Connect and Protect: Networks and Network Security at Coursera Course details
- This is the third course in the Google Cybersecurity Certificate. These courses will equip you with the skills you need to apply for an entry-level cybersecurity job. You’ll build on your understanding of the topics that were introduced in the second Google Cybersecurity Certificate course.
- In this course, you will explore how networks connect multiple devices and allow them to communicate. You'll start with the fundamentals of modern networking operations and protocols. For example, you'll learn about the Transmission Control Protocol / Internet Protocol (TCP/IP) model and how network hardware, like routers and modems, allow your computer to send and receive information on the internet. Then, you'll learn about network security. Organizations often store and send valuable information on their networks, so networks are common targets of cyber attacks. By the end of this course, you'll be able to recognize network-level vulnerabilities, and explain how to secure a network using firewalls, system hardening, and virtual private networks.
- Google employees who currently work in cybersecurity will guide you through videos, provide hands-on activities and examples that simulate common cybersecurity tasks, and help you build your skills to prepare for jobs.
- Learners who complete this certificate will be equipped to apply for entry-level cybersecurity roles. No previous experience is necessary.
- By the end of this course, you will:
- - Describe the structure of different computer networks.
- - Illustrate how data is sent and received over a network.
- - Recognize common network protocols.
- - Identify common network security measures and protocols.
- - Explain how to secure a network against intrusion tactics.
- - Compare and contrast local networks to cloud computing.
- - Explain the different types of system hardening techniques.
Connect and Protect: Networks and Network Security at Coursera Curriculum
Network architecture
Introduction to Course 3
Welcome to week 1
Chris: My path to cybersecurity
What are networks?
Tina: Working in network security
Emmanuel: Useful skills for network security
Network tools
Cloud networks
Introduction to network communication
The TCP/IP model
The four layers of the TCP/IP model
IP addresses and network communication
Wrap-up
Course 3 overview
Helpful resources and tips
Network components, devices, and diagrams
Cloud computing and software-defined networks
Learn more about the TCP/IP model
The OSI model
Components of network layer communication
Glossary terms from week 1
Test your knowledge: Introduction to networks
Test your knowledge: Network communication
Test your knowledge: Local and wide network communication
Weekly challenge 1
Network operations
Welcome to week 2
Network protocols
Wireless protocols
Firewalls and network security measures
Virtual private networks (VPNs)
Security zones
Proxy servers
Wrap-up
Common network protocols
Additional network protocols
The evolution of wireless security protocols
Subnetting and CIDR
Virtual networks and privacy
Glossary terms from week 2
Test your knowledge: Recognize different network protocols
Test your knowledge: System identification
Weekly challenge 2
Secure against network intrusions
Welcome to week 3
The case for securing networks
Denial of Service (DoS) attacks
Malicious packet sniffing
IP Spoofing
Wrap-up
How intrusions compromise your system
Read tcpdump logs
Activity Exemplar: Analyze network layer communication
Real-life DDoS attack
Overview of interception tactics
Activity Exemplar: Analyze network attacks
Glossary terms from week 3
Activity: Analyze network layer communication
Test your knowledge: Secure networks against Denial of Service (DoS) attacks
Activity: Analyze network attacks
Test your knowledge: Network interception attack tactics
Weekly challenge 3
Security hardening
Welcome to week 4
Security hardening
OS hardening practices
Network hardening practices
Network security in the cloud
Kelsey: Cloud security explained
Wrap-up
Course wrap-up
Brute force attacks and OS hardening
Activity Exemplar: Apply OS hardening techniques
Network security applications
Activity Exemplar: Analysis of network hardening
Secure the cloud
Glossary terms from week 4
Portfolio Activity Exemplar: Use the NIST Cybersecurity Framework to respond to a security incident
Course 3 glossary
Get started on the next course
Activity: Apply OS hardening techniques
Test your knowledge: OS hardening
Activity: Analysis of network hardening
Test your knowledge: Network hardening
Test your knowledge: Cloud hardening
Weekly challenge 4
Portfolio Activity: Use the NIST Cybersecurity Framework to respond to a security incident