EC-Council - Network Defense Essentials (NDE)
- Offered byCoursera
Network Defense Essentials (NDE) at Coursera Overview
Duration | 31 hours |
Start from | Start Now |
Total fee | Free |
Mode of learning | Online |
Difficulty level | Beginner |
Official Website | Explore Free Course |
Credential | Certificate |
Network Defense Essentials (NDE) at Coursera Highlights
- Earn a Certificate upon completion
Network Defense Essentials (NDE) at Coursera Course details
- Network Defense Essentials covers the fundamental concepts of information security and network defense
- This introductory cybersecurity course is designed for today's entry-level information security or cybersecurity careers and is ideal for learners aspiring to pursue a career in cybersecurity
- The course gives a holistic overview of the key components of Information Security such as Identification, Authentication and Authorization, Virtualization and Cloud Computing, Wireless Networks, Mobile and IoT Devices, and Data Security
- The interactive labs component of this course ensures that learners receive the hands-on, practical experience required for a future in cybersecurity
Network Defense Essentials (NDE) at Coursera Curriculum
Module 01: Network Security Fundamentals
Course Introduction
Video 1.1: Introduction
Video 1.2: Understanding the Goals of Network Defense
Video 1.3: Understanding Information Assurance (IA) Principles
Video 1.4: Understanding the Benefits and Challenges of Network Defense
Video 1.5: Overview of Different Types of Network Defense Approaches
Video 1.6: Understanding the Different Types of Network Security Controls
Video 1.7: Understanding the Different Network Security Protocols
Video 1.2: Quiz
Video 1.3: Quiz
Video 1.4: Quiz
Video 1.5: Quiz
Video 1.6: Quiz
Video 1.7: Quiz
Module 01 - Quiz
Video 2.1: Introduction
Video 2.2: Understanding the Terminology, Principles, and Models of Access Control
Video 2.3: Understanding Identity and Access Management (IAM)
Video 2.4: Understanding User Access Management
Video 2.5: Overview of Different Types of Authentication
Video 2.6: Overview of Different Types of Authorization
Video 2.7: Understanding User Accounting
Video 2.2: Quiz
Video 2.3: Quiz
Video 2.4: Quiz
Video 2.5: Quiz
Video 2.6: Quiz
Video 2.7: Quiz
Module 02 - Quiz
Module 03: Network Security Controls - Administrative Controls
Video 3.1: Introduction
Video 3.2: Understanding Why Organizations Need Compliance
Video 3.3: Understanding Various Regulatory Frameworks, Laws, and Acts
Video 3.4: Understanding the Need for and Characteristics of Good Security Policy
Video 3.5: Understanding How to Design and Develop Security Policies
Video 3.6: Overview of Different Types of Security Policies
Video 3.7: Understanding the Different Types of Security and Awareness Training
Video 3.2: Quiz
Video 3.3: Quiz
Video 3.4: Quiz
Video 3.5: Quiz
Video 3.6: Quiz
Video 3.7: Quiz
Module 03 - Quiz
Video 4.1: Introduction
Video 4.2: Understanding the Importance of Physical Security
Video 4.3: Understanding the Physical Security Attack Vectors
Video 4.4: Understanding the Various Types of Physical Security Controls
Video 4.5: Understanding the Importance of Workplace Security
Video 4.6: Overview of Physical Security Policy
Video 4.7: Understanding the Various Environmental Controls
Video 4.2: Quiz
Video 4.3: Quiz
Video 4.4: Quiz
Video 4.5: Quiz
Video 4.6: Quiz
Video 4.7: Quiz
Module 04 - Quiz
Module 05: Network Security Controls - Technical Controls
Video 5.1: Introduction
Video 5.2: Understanding Network Segmentation and its Types
Video 5.3: Understanding the Different Types of Firewalls and their Roles
Video 5.4: Understanding the Different Types of IDS/IPS and their Roles
Video 5.5: Overview of Different Types of Honeypots
Video 5.6: Understanding the Different Types of Proxy Servers and their Benefits
Video 5.7: Understanding the Fundamentals of Virtual Private Networks (VPNs) and their Importance in Network Security
Video 5.8: Overview of Security Incident and Event Management (SIEM) and User Behavior Analytics (UBA)
Video 5.9: Overview of Various Antivirus/Anti-malware Software
Video 5.2: Quiz
Video 5.3: Quiz
Video 5.4: Quiz
Video 5.5: Quiz
Video 5.6: Quiz
Video 5.7: Quiz
Video 5.8: Quiz
Video 5.9: Quiz
Module 05 - Quiz
Video 6.1: Introduction
Video 6.2: Understanding Virtualization, its Components, and Virtualization Enablers
Video 6.3: Understanding OS Virtualization Security and Concerns
Video 6.4: Understanding the Best Practices for OS Virtualization Security
Video 6.5: Understanding Cloud Computing and its Benefits
Video 6.6: Overview of Different Types of Cloud Computing Services
Video 6.7: Overview of Cloud Deployment Models
Video 6.8: Understanding Importance of Cloud Security and its Best Practices
Video 6.2: Quiz
Video 6.3: Quiz
Video 6.4: Quiz
Video 6.5: Quiz
Video 6.6: Quiz
Video 6.7: Quiz
Video 6.8: Quiz
Module 06 - Quiz
Module 07: Wireless Network Security
Video 7.1: Introduction
Video 7.2: Understanding the Wireless Terminology, Wireless Networks, and Wireless Standards
Video 7.3: Understanding the Wireless Network Topologies and Classification of Wireless Networks
Video 7.4: Understanding the Components of a Wireless Network
Video 7.5: Overview of Wireless Network Encryption Mechanisms
Video 7.6: Understanding the Different Types of Wireless Network Authentication Methods
Video 7.7: Understanding Wireless Network Security Measures and Wireless Security Tools
Video 7.2: Quiz
Video 7.3: Quiz
Video 7.4: Quiz
Video 7.5: Quiz
Video 7.6: Quiz
Video 7.7: Quiz
Module 07 - Quiz
Video 8.1: Introduction
Video 8.2: Understanding the Various Mobile Device Connection Methods
Video 8.3: Understanding the Concepts of Mobile Device Management
Video 8.4: Understanding the Common Mobile Use Approaches in Enterprises
Video 8.5: Understand the Security Risk and Guidelines Associated with Enterprises Mobile Usage Policies
Video 8.6: Understanding Enterprise-level Mobile Security Management Solutions
Video 8.7: Understanding the General Security Guidelines and Best Practices for Mobile Platforms
Video 8.2: Quiz
Video 8.3: Quiz
Video 8.4: Quiz
Video 8.5: Quiz
Video 8.6: Quiz
Video 8.7: Quiz
Module 08 - Quiz
Module 09: IoT Device Security
Video 9.1: Introduction
Video 9.2: Understanding the IoT and Why Organizations Opt for IoT-enabled Environments
Video 9.3: Overview of IoT Application Areas and IoT Devices
Video 9.3: Understanding the IoT Architecture and IoT Communication Models
Video 9.4: Understanding the Security in IoT-Enabled Environments
Video 9.5: Understanding the Security Considerations of the IoT Framework
Video 9.6: Overview of IoT Device Management
Video 9.7: Understanding the Best Practices and Tools for IoT Security
Video 9.2: Quiz
Video 9.3: Quiz
Video 9.3: Quiz
Video 9.4: Quiz
Video 9.5: Quiz
Video 9.6: Quiz
Video 9.7: Quiz
Module 09 - Quiz
Video 10.1: Introduction
Video 10.2: Understanding Cryptographic Techniques
Video 10.3: Understanding the Different Encryption Algorithms
Video 10.4: Understanding the Different Hashing Algorithms
Video 10.5: Overview of Different Cryptography Tools and Hash Calculators
Video 10.6: Understanding Public Key Infrastructure (PKI), Digital Signatures and Digital Certificates
Video 10.2: Quiz
Video 10.3: Quiz
Video 10.4: Quiz
Video 10.5: Quiz
Video 10.6: Quiz
Module 10 - Quiz
Module 11: Data Security
Video 11.1: Introduction
Video 11.2: Understanding Data Security and its Importance
Video 11.3: Understanding the Different Data Security Technologies
Video 11.4: Understanding the Various Security Controls for Data Encryption
Video 11.5: Overview of Disk Encryption, File Encryption, and Removable-media Encryption Tools
Video 11.6: Understanding the Methods and Tools for Data Backup and Retention
Video 11.7: Understanding the Data Loss Prevention (DLP) and DLP Solutions
Video 11.2: Quiz
Video 11.3: Understanding the Different Data Security Technologies - Quiz
Video 11.4: Quiz
11.5: Quiz
Video 11.6: Quiz
Video 11.7: Quiz
Module 11 -Quiz
Video 12.1: Introduction
Video 12.2: Understanding the Need for and Advantages of Network Traffic Monitoring
Video 12.3: Understanding the Network Traffic Signatures
Video 12.4: Understanding the Categories of Suspicious Traffic Signatures
Video 12.5: Overview of Attack Signature Analysis Techniques
Video 12.6: Understanding Network Monitoring for Suspicious Traffic
Video 12.7: Overview of Various Network Monitoring Tools
Video 12.2: Quiz
Video 12.3: Quiz
Video 12.4: Quiz
Video 12.5: Quiz
Video 12.6: Quiz
Video 12.7: Quiz
Module 12 - Quiz