Coursera
Coursera Logo

IBM - Network Security & Database Vulnerabilities 

  • Offered byCoursera

Network Security & Database Vulnerabilities
 at 
Coursera 
Overview

Duration

14 hours

Start from

Start Now

Total fee

Free

Mode of learning

Online

Difficulty level

Beginner

Official Website

Explore Free Course External Link Icon

Credential

Certificate

Network Security & Database Vulnerabilities
 at 
Coursera 
Highlights

  • Earn a shareable certificate upon completion.
  • Flexible deadlines according to your schedule.
  • Affordable programs and 7 day free trial.
Details Icon

Network Security & Database Vulnerabilities
 at 
Coursera 
Course details

More about this course
  • This course gives you the background needed to understand basic network security. You will learn the about Local Area Networks, TCP/IP, the OSI Framework and routing basics. You will learn how networking affects security systems within an organization. You will learn the network components that guard an organization from cybersecurity attacks.
  • In addition to networking, you will learn about database vulnerabilities and the tools/knowledge needed to research a database vulnerability for a variety of databases including SQL Injection, Oracle, Mongo and Couch.
  • You will learn about various security breach types associated with databases and organizations that define standards and provide tools for cybersecurity professionals.
  • This course is intended for anyone who wants to gain a basic understanding of Network Security/Database Vulnerabilities or as the fourth course in a series of courses to acquire the skills to work in the Cybersecurity field as a Jr Cybersecurity Analyst.
Read more

Network Security & Database Vulnerabilities
 at 
Coursera 
Curriculum

TCP/IP Framework

Welcome to the Course: Network Security & Database Vulnerabilities

Welcome to Introduction to TCP/IP Framework

Stateless Inspection

Stateful Inspection

Firewall Filters- IDS and IPS Systems

The Difference between IDS and IPS Systems

Network Address Translation

An Introduction to Local Area Networks

Ethernet and LAN - Ethernet Operations

Ethernet and LAN - Network Devices

Introduction to Basic Network Routing

Layer 2 and Layer 3 Network Addressing

Address Resolution Protocol

Routers and Routing Tables, Part 1

Routers and Routing Tables, Part 2

Routers and Routing Tables, Part 3

Earn an IBM digital badge

About this course

Research of Network Vendor Training

Introduction to the TCP/IP Protocol Framework

Network Protocols over Ethernet and Local Area Networks

Basics of Routing and Switching, Network Packets and Structures

TCP/IP Framework

Basics of IP Addressing and the OSI Model

Welcome to the Basics of IP Addressing and the OSI Model

IP Addressing - The Basics of Binary

IP Address Structure and Network Classes

IP Protocol and Traffic Routing

Introduction to the IPv6 Address Schema

Application and Transport Protocols UDP and TCP, Part 1

Application and Transport Protocols UDP and TCP, Part 2

DNS and DHCP

Syslog Message Logging Protocol

Flows and Network Analysis

Port Mirroring and Promiscuous Mode

Next Generation Firewalls - Overview

NGFW and the OSI Model

NGFW Packet Flow Example and NGFW Comparisons

Intrusion Detection and Intrusion Prevention Systems

High Availability and Clustering

Basics of IP Addressing

TCP/IP Layer 4, Transport Layer Overview

TCP/IP Layer 5, Application Layer Overview

Firewalls, Intrusion Detection and Intrusion Prevention Systems

Clustering and High Availability Systems

Basics of IP Addressing and the OSI Model

Introduction to Databases

Welcome to Introduction to Databases

Data Source Types Part 1

Data Source Types Part 2

Data Model Types

Structured Data

Securing the Crown Jewels

Leveraging Security Industry Best Practices

Structured Data and Relational Databases

Anatomy of a Vulnerability Assessment Test Report

Securing Data Sources by Type

Securing Databases Wrap Up

Data Monitoring

Data Alerts

Data Activity Reporting

Attributes to Include in Logging

Failed Access Monitoring

Suspicious Access Events, Part 1

Suspicious Access Events, Part 2

Data Breach Feeds

Types of Data

Securing Databases

A Data Protection Solution Example, IBM Security Guardium Use Cases

Introduction to Databases

Deep Dive - Injection Vulnerability

Welcome to Deep Dive - Injection Vulnerability

Introduction to Injection Flaws

OS Command Injection Part 1

OS Command Injection Part 2

OS Command Injection Part 3

SQL Injection Part 1

SQL Injection Part 2

Other Types of Injection

Thank you for attending this course

Additional Resources

Injection Vulnerability

SQL Injection

Deep Dive - Injection Vulnerability

Opt-in to receive your badge!

Network Security & Database Vulnerabilities
 at 
Coursera 
Admission Process

    Important Dates

    May 25, 2024
    Course Commencement Date

    Other courses offered by Coursera

    – / –
    3 months
    Beginner
    – / –
    20 hours
    Beginner
    – / –
    2 months
    Beginner
    – / –
    3 months
    Beginner
    View Other 6715 CoursesRight Arrow Icon
    qna

    Network Security & Database Vulnerabilities
     at 
    Coursera 

    Student Forum

    chatAnything you would want to ask experts?
    Write here...