Coursera
Coursera Logo

EC-Council - Network Defense Essentials (NDE) 

  • Offered byCoursera

Network Defense Essentials (NDE)
 at 
Coursera 
Overview

Duration

31 hours

Start from

Start Now

Total fee

Free

Mode of learning

Online

Difficulty level

Beginner

Official Website

Explore Free Course External Link Icon

Credential

Certificate

Network Defense Essentials (NDE)
 at 
Coursera 
Highlights

  • Earn a Certificate upon completion
Details Icon

Network Defense Essentials (NDE)
 at 
Coursera 
Course details

More about this course
  • Network Defense Essentials covers the fundamental concepts of information security and network defense
  • This introductory cybersecurity course is designed for today's entry-level information security or cybersecurity careers and is ideal for learners aspiring to pursue a career in cybersecurity
  • The course gives a holistic overview of the key components of Information Security such as Identification, Authentication and Authorization, Virtualization and Cloud Computing, Wireless Networks, Mobile and IoT Devices, and Data Security
  • The interactive labs component of this course ensures that learners receive the hands-on, practical experience required for a future in cybersecurity

Network Defense Essentials (NDE)
 at 
Coursera 
Curriculum

Module 01: Network Security Fundamentals

Course Introduction

Video 1.1: Introduction

Video 1.2: Understanding the Goals of Network Defense

Video 1.3: Understanding Information Assurance (IA) Principles

Video 1.4: Understanding the Benefits and Challenges of Network Defense

Video 1.5: Overview of Different Types of Network Defense Approaches

Video 1.6: Understanding the Different Types of Network Security Controls

Video 1.7: Understanding the Different Network Security Protocols

Video 1.2: Quiz

Video 1.3: Quiz

Video 1.4: Quiz

Video 1.5: Quiz

Video 1.6: Quiz

Video 1.7: Quiz

Module 01 - Quiz

Video 2.1: Introduction

Video 2.2: Understanding the Terminology, Principles, and Models of Access Control

Video 2.3: Understanding Identity and Access Management (IAM)

Video 2.4: Understanding User Access Management

Video 2.5: Overview of Different Types of Authentication

Video 2.6: Overview of Different Types of Authorization

Video 2.7: Understanding User Accounting

Video 2.2: Quiz

Video 2.3: Quiz

Video 2.4: Quiz

Video 2.5: Quiz

Video 2.6: Quiz

Video 2.7: Quiz

Module 02 - Quiz

Module 03: Network Security Controls - Administrative Controls

Video 3.1: Introduction

Video 3.2: Understanding Why Organizations Need Compliance

Video 3.3: Understanding Various Regulatory Frameworks, Laws, and Acts

Video 3.4: Understanding the Need for and Characteristics of Good Security Policy

Video 3.5: Understanding How to Design and Develop Security Policies

Video 3.6: Overview of Different Types of Security Policies

Video 3.7: Understanding the Different Types of Security and Awareness Training

Video 3.2: Quiz

Video 3.3: Quiz

Video 3.4: Quiz

Video 3.5: Quiz

Video 3.6: Quiz

Video 3.7: Quiz

Module 03 - Quiz

Video 4.1: Introduction

Video 4.2: Understanding the Importance of Physical Security

Video 4.3: Understanding the Physical Security Attack Vectors

Video 4.4: Understanding the Various Types of Physical Security Controls

Video 4.5: Understanding the Importance of Workplace Security

Video 4.6: Overview of Physical Security Policy

Video 4.7: Understanding the Various Environmental Controls

Video 4.2: Quiz

Video 4.3: Quiz

Video 4.4: Quiz

Video 4.5: Quiz

Video 4.6: Quiz

Video 4.7: Quiz

Module 04 - Quiz

Module 05: Network Security Controls - Technical Controls

Video 5.1: Introduction

Video 5.2: Understanding Network Segmentation and its Types

Video 5.3: Understanding the Different Types of Firewalls and their Roles

Video 5.4: Understanding the Different Types of IDS/IPS and their Roles

Video 5.5: Overview of Different Types of Honeypots

Video 5.6: Understanding the Different Types of Proxy Servers and their Benefits

Video 5.7: Understanding the Fundamentals of Virtual Private Networks (VPNs) and their Importance in Network Security

Video 5.8: Overview of Security Incident and Event Management (SIEM) and User Behavior Analytics (UBA)

Video 5.9: Overview of Various Antivirus/Anti-malware Software

Video 5.2: Quiz

Video 5.3: Quiz

Video 5.4: Quiz

Video 5.5: Quiz

Video 5.6: Quiz

Video 5.7: Quiz

Video 5.8: Quiz

Video 5.9: Quiz

Module 05 - Quiz

Video 6.1: Introduction

Video 6.2: Understanding Virtualization, its Components, and Virtualization Enablers

Video 6.3: Understanding OS Virtualization Security and Concerns

Video 6.4: Understanding the Best Practices for OS Virtualization Security

Video 6.5: Understanding Cloud Computing and its Benefits

Video 6.6: Overview of Different Types of Cloud Computing Services

Video 6.7: Overview of Cloud Deployment Models

Video 6.8: Understanding Importance of Cloud Security and its Best Practices

Video 6.2: Quiz

Video 6.3: Quiz

Video 6.4: Quiz

Video 6.5: Quiz

Video 6.6: Quiz

Video 6.7: Quiz

Video 6.8: Quiz

Module 06 - Quiz

Module 07: Wireless Network Security

Video 7.1: Introduction

Video 7.2: Understanding the Wireless Terminology, Wireless Networks, and Wireless Standards

Video 7.3: Understanding the Wireless Network Topologies and Classification of Wireless Networks

Video 7.4: Understanding the Components of a Wireless Network

Video 7.5: Overview of Wireless Network Encryption Mechanisms

Video 7.6: Understanding the Different Types of Wireless Network Authentication Methods

Video 7.7: Understanding Wireless Network Security Measures and Wireless Security Tools

Video 7.2: Quiz

Video 7.3: Quiz

Video 7.4: Quiz

Video 7.5: Quiz

Video 7.6: Quiz

Video 7.7: Quiz

Module 07 - Quiz

Video 8.1: Introduction

Video 8.2: Understanding the Various Mobile Device Connection Methods

Video 8.3: Understanding the Concepts of Mobile Device Management

Video 8.4: Understanding the Common Mobile Use Approaches in Enterprises

Video 8.5: Understand the Security Risk and Guidelines Associated with Enterprises Mobile Usage Policies

Video 8.6: Understanding Enterprise-level Mobile Security Management Solutions

Video 8.7: Understanding the General Security Guidelines and Best Practices for Mobile Platforms

Video 8.2: Quiz

Video 8.3: Quiz

Video 8.4: Quiz

Video 8.5: Quiz

Video 8.6: Quiz

Video 8.7: Quiz

Module 08 - Quiz

Module 09: IoT Device Security

Video 9.1: Introduction

Video 9.2: Understanding the IoT and Why Organizations Opt for IoT-enabled Environments

Video 9.3: Overview of IoT Application Areas and IoT Devices

Video 9.3: Understanding the IoT Architecture and IoT Communication Models

Video 9.4: Understanding the Security in IoT-Enabled Environments

Video 9.5: Understanding the Security Considerations of the IoT Framework

Video 9.6: Overview of IoT Device Management

Video 9.7: Understanding the Best Practices and Tools for IoT Security

Video 9.2: Quiz

Video 9.3: Quiz

Video 9.3: Quiz

Video 9.4: Quiz

Video 9.5: Quiz

Video 9.6: Quiz

Video 9.7: Quiz

Module 09 - Quiz

Video 10.1: Introduction

Video 10.2: Understanding Cryptographic Techniques

Video 10.3: Understanding the Different Encryption Algorithms

Video 10.4: Understanding the Different Hashing Algorithms

Video 10.5: Overview of Different Cryptography Tools and Hash Calculators

Video 10.6: Understanding Public Key Infrastructure (PKI), Digital Signatures and Digital Certificates

Video 10.2: Quiz

Video 10.3: Quiz

Video 10.4: Quiz

Video 10.5: Quiz

Video 10.6: Quiz

Module 10 - Quiz

Module 11: Data Security

Video 11.1: Introduction

Video 11.2: Understanding Data Security and its Importance

Video 11.3: Understanding the Different Data Security Technologies

Video 11.4: Understanding the Various Security Controls for Data Encryption

Video 11.5: Overview of Disk Encryption, File Encryption, and Removable-media Encryption Tools

Video 11.6: Understanding the Methods and Tools for Data Backup and Retention

Video 11.7: Understanding the Data Loss Prevention (DLP) and DLP Solutions

Video 11.2: Quiz

Video 11.3: Understanding the Different Data Security Technologies - Quiz

Video 11.4: Quiz

11.5: Quiz

Video 11.6: Quiz

Video 11.7: Quiz

Module 11 -Quiz

Video 12.1: Introduction

Video 12.2: Understanding the Need for and Advantages of Network Traffic Monitoring

Video 12.3: Understanding the Network Traffic Signatures

Video 12.4: Understanding the Categories of Suspicious Traffic Signatures

Video 12.5: Overview of Attack Signature Analysis Techniques

Video 12.6: Understanding Network Monitoring for Suspicious Traffic

Video 12.7: Overview of Various Network Monitoring Tools

Video 12.2: Quiz

Video 12.3: Quiz

Video 12.4: Quiz

Video 12.5: Quiz

Video 12.6: Quiz

Video 12.7: Quiz

Module 12 - Quiz

Network Defense Essentials (NDE)
 at 
Coursera 
Admission Process

    Important Dates

    May 25, 2024
    Course Commencement Date

    Other courses offered by Coursera

    – / –
    3 months
    Beginner
    – / –
    20 hours
    Beginner
    – / –
    2 months
    Beginner
    – / –
    3 months
    Beginner
    View Other 6715 CoursesRight Arrow Icon
    qna

    Network Defense Essentials (NDE)
     at 
    Coursera 

    Student Forum

    chatAnything you would want to ask experts?
    Write here...