Coursera
Coursera Logo

Network Security 

  • Offered byCoursera

Network Security
 at 
Coursera 
Overview

Duration

11 hours

Start from

Start Now

Total fee

Free

Mode of learning

Online

Official Website

Explore Free Course External Link Icon

Credential

Certificate

Network Security
 at 
Coursera 
Highlights

  • Flexible deadlines Reset deadlines in accordance to your schedule.
  • Shareable Certificate Earn a Certificate upon completion
  • 100% online Start instantly and learn at your own schedule.
  • Course 3 of 7 in the Cybersecurity Operations Fundamentals Specialization
  • Approx. 11 hours to complete
  • English Subtitles: English
Read more
Details Icon

Network Security
 at 
Coursera 
Course details

More about this course
  • If you are an associate-level cybersecurity analyst who is working in security operation centers, this course will provide introduction to network infrastructure and network security monitoring tools. By the end of the course, you will be able to:
  • Describe ACL operation when using the established option Describe the purpose of Access List Control lists
  • •Describe network address translation (NAT) fundamental concepts • Explain the NSM tools that are available to the network security analyst
  • • Describe the three types of NSM tools used within the SOC (commercial, Open Source, or homegrown) • Describe network-based malware protection • Describe the benefits of load balancing and web application firewalls.
  • • Describe AAA
  • • Describe basic models for implementing access controls over network resources.
  • To be successful in this course, you should have the following background:
  • 1. Skills and knowledge equivalent to those learned in Implementing and Administering Cisco Solutions (CCNA) v1.0 course
  • 2. Familiarity with Ethernet and TCP/IP networking
  • 3. Working knowledge of the Windows and Linux operating systems
  • 4. Familiarity with basics of networking security concepts.
Read more

Network Security
 at 
Coursera 
Curriculum

Understanding Network Infrastructure and Network Security Monitoring Tools

Introduction To Understanding Network Infrastructure and Network Security Monitoring Tools

NAT Fundamentals

Packet Filtering with ACLs

ACLs with the Established Option

Access Control Models

Authentication, Authorization, and Accounting

Network-Based Malware Protection

Network Security Monitoring Tools

Wrap-Up

Introduction TO Understanding Network Infrastructure and Network Security Monitoring Tools

NAT Fundamentals

NAT Requirements

Port Address Translation

Packet Filtering with ACLs

ACL Example

ACLs with the Established Option

ACLs with the Established Option Example

Access Conrtol Models Introduction

Access Control Models

Authentication, Authorization, and Accounting

Load Balancing

Web Application Firewall

Network-Based Malware Protection

Network Security Monitoring Tools

Wrap-Up

NAT Fundamentals Practice Quiz

Packet Filtering with ACLs Practice Quiz

ACLs with the Established Option Practice Quiz

Authentication, Authorization, and Account Practice Quiz

Load Balancing Practice Quiz

Network-Based Malware Protection Practice Quiz

Network Security Monitoring Tools

Understanding Network Infrastructure and Network Security Monitoring Tools Course Exam

Understanding Common TCP/IP Attacks

Introduction to Understanding Common TCP/IP Attacks

Address Resolution Protocol

Legacy TCP/IP Vulnerabilities

IP Vulnerabilities

ICMP Vulnerabilities

TCP Vulnerabilities

UDP Vulnerabilities

Attack Surface and Attack Vectors

Reconnaissance Attacks

Access Attacks

Man-in-the-Middle Attacks

Denial of Service and Distributed Denial of Service

Reflection and Amplification Attacks

Spoofing Attacks

DHCP Attacks

Wrap-Up

Introduction to Understanding Common TCP/IP Attacks

Address Resolution Protocol

The arp -a Command

Legacy TCP/IP

Legacy TCP/IP Vulnerabilities

IP Protocol

IP Vulnerabilities

ICMP Protocol

ICMP Vulnerabilities

TCP Protocol

TCP Vulnerabilities

TCP SYN Flooding

TCP Session Hijacking

TCP Reset Attack

UDP Protocol

UDP Vulnerabilities

Attack Surface and Attack Vectors

Attack Surface

Attack Vectors

Security Risks and Challenges

Reconnaissance Attacks

Passive and Active Reconnaissance

Whois

Shodan Search Engine

Robots.txt File

Nmap Port Scan

Vulnerability Scanners

Access Attacks

Man-in-the-Middle Attacks

Denial of Service and Distributed Denial of Service

DDoS Trends

Reflection and Amplification Attacks

Spoofing Attacks

DHCP Attacks

Wrap-Up

Address Resolution Protocol Practice Quiz

Legacy TCP/IP Vulnerabilities Practice Quiz

IP Vulnerabilities Practice Quiz

ICMP Vulnerabilities Practice Quiz

TCP Vulnerabilities Practice Quiz

UDP Vulnerabilities Practice Quiz

Attack Surface and Attack Vectors Practice Quiz

Reconnaissance Attacks Practice Quiz

Access Attacks Practice Quiz

Man-in-the-Middle Attacks Practice Quiz

Denial of Service and Distributed Denial of Service Practice Quiz

Reflection and Amplification Attacks Practice Quiz

Spoofing Attacks Practice Quiz

DHCP Attacks Practice Quiz

Understanding Common TCP/IP Attacks Course Exam

Network Security
 at 
Coursera 
Admission Process

    Important Dates

    May 25, 2024
    Course Commencement Date

    Other courses offered by Coursera

    – / –
    3 months
    Beginner
    – / –
    20 hours
    Beginner
    – / –
    2 months
    Beginner
    – / –
    3 months
    Beginner
    View Other 6714 CoursesRight Arrow Icon
    qna

    Network Security
     at 
    Coursera 

    Student Forum

    chatAnything you would want to ask experts?
    Write here...