Network Security
- Offered byCoursera
Network Security at Coursera Overview
Duration | 11 hours |
Start from | Start Now |
Total fee | Free |
Mode of learning | Online |
Official Website | Explore Free Course |
Credential | Certificate |
Network Security at Coursera Highlights
- Flexible deadlines Reset deadlines in accordance to your schedule.
- Shareable Certificate Earn a Certificate upon completion
- 100% online Start instantly and learn at your own schedule.
- Course 3 of 7 in the Cybersecurity Operations Fundamentals Specialization
- Approx. 11 hours to complete
- English Subtitles: English
Network Security at Coursera Course details
- If you are an associate-level cybersecurity analyst who is working in security operation centers, this course will provide introduction to network infrastructure and network security monitoring tools. By the end of the course, you will be able to:
- Describe ACL operation when using the established option Describe the purpose of Access List Control lists
- •Describe network address translation (NAT) fundamental concepts • Explain the NSM tools that are available to the network security analyst
- • Describe the three types of NSM tools used within the SOC (commercial, Open Source, or homegrown) • Describe network-based malware protection • Describe the benefits of load balancing and web application firewalls.
- • Describe AAA
- • Describe basic models for implementing access controls over network resources.
- To be successful in this course, you should have the following background:
- 1. Skills and knowledge equivalent to those learned in Implementing and Administering Cisco Solutions (CCNA) v1.0 course
- 2. Familiarity with Ethernet and TCP/IP networking
- 3. Working knowledge of the Windows and Linux operating systems
- 4. Familiarity with basics of networking security concepts.
Network Security at Coursera Curriculum
Understanding Network Infrastructure and Network Security Monitoring Tools
Introduction To Understanding Network Infrastructure and Network Security Monitoring Tools
NAT Fundamentals
Packet Filtering with ACLs
ACLs with the Established Option
Access Control Models
Authentication, Authorization, and Accounting
Network-Based Malware Protection
Network Security Monitoring Tools
Wrap-Up
Introduction TO Understanding Network Infrastructure and Network Security Monitoring Tools
NAT Fundamentals
NAT Requirements
Port Address Translation
Packet Filtering with ACLs
ACL Example
ACLs with the Established Option
ACLs with the Established Option Example
Access Conrtol Models Introduction
Access Control Models
Authentication, Authorization, and Accounting
Load Balancing
Web Application Firewall
Network-Based Malware Protection
Network Security Monitoring Tools
Wrap-Up
NAT Fundamentals Practice Quiz
Packet Filtering with ACLs Practice Quiz
ACLs with the Established Option Practice Quiz
Authentication, Authorization, and Account Practice Quiz
Load Balancing Practice Quiz
Network-Based Malware Protection Practice Quiz
Network Security Monitoring Tools
Understanding Network Infrastructure and Network Security Monitoring Tools Course Exam
Understanding Common TCP/IP Attacks
Introduction to Understanding Common TCP/IP Attacks
Address Resolution Protocol
Legacy TCP/IP Vulnerabilities
IP Vulnerabilities
ICMP Vulnerabilities
TCP Vulnerabilities
UDP Vulnerabilities
Attack Surface and Attack Vectors
Reconnaissance Attacks
Access Attacks
Man-in-the-Middle Attacks
Denial of Service and Distributed Denial of Service
Reflection and Amplification Attacks
Spoofing Attacks
DHCP Attacks
Wrap-Up
Introduction to Understanding Common TCP/IP Attacks
Address Resolution Protocol
The arp -a Command
Legacy TCP/IP
Legacy TCP/IP Vulnerabilities
IP Protocol
IP Vulnerabilities
ICMP Protocol
ICMP Vulnerabilities
TCP Protocol
TCP Vulnerabilities
TCP SYN Flooding
TCP Session Hijacking
TCP Reset Attack
UDP Protocol
UDP Vulnerabilities
Attack Surface and Attack Vectors
Attack Surface
Attack Vectors
Security Risks and Challenges
Reconnaissance Attacks
Passive and Active Reconnaissance
Whois
Shodan Search Engine
Robots.txt File
Nmap Port Scan
Vulnerability Scanners
Access Attacks
Man-in-the-Middle Attacks
Denial of Service and Distributed Denial of Service
DDoS Trends
Reflection and Amplification Attacks
Spoofing Attacks
DHCP Attacks
Wrap-Up
Address Resolution Protocol Practice Quiz
Legacy TCP/IP Vulnerabilities Practice Quiz
IP Vulnerabilities Practice Quiz
ICMP Vulnerabilities Practice Quiz
TCP Vulnerabilities Practice Quiz
UDP Vulnerabilities Practice Quiz
Attack Surface and Attack Vectors Practice Quiz
Reconnaissance Attacks Practice Quiz
Access Attacks Practice Quiz
Man-in-the-Middle Attacks Practice Quiz
Denial of Service and Distributed Denial of Service Practice Quiz
Reflection and Amplification Attacks Practice Quiz
Spoofing Attacks Practice Quiz
DHCP Attacks Practice Quiz
Understanding Common TCP/IP Attacks Course Exam