IBM - Network Security & Database Vulnerabilities
- Offered byCoursera
Network Security & Database Vulnerabilities at Coursera Overview
Duration | 14 hours |
Start from | Start Now |
Total fee | Free |
Mode of learning | Online |
Difficulty level | Beginner |
Official Website | Explore Free Course |
Credential | Certificate |
Network Security & Database Vulnerabilities at Coursera Highlights
- Earn a shareable certificate upon completion.
- Flexible deadlines according to your schedule.
- Affordable programs and 7 day free trial.
Network Security & Database Vulnerabilities at Coursera Course details
- This course gives you the background needed to understand basic network security. You will learn the about Local Area Networks, TCP/IP, the OSI Framework and routing basics. You will learn how networking affects security systems within an organization. You will learn the network components that guard an organization from cybersecurity attacks.
- In addition to networking, you will learn about database vulnerabilities and the tools/knowledge needed to research a database vulnerability for a variety of databases including SQL Injection, Oracle, Mongo and Couch.
- You will learn about various security breach types associated with databases and organizations that define standards and provide tools for cybersecurity professionals.
- This course is intended for anyone who wants to gain a basic understanding of Network Security/Database Vulnerabilities or as the fourth course in a series of courses to acquire the skills to work in the Cybersecurity field as a Jr Cybersecurity Analyst.
Network Security & Database Vulnerabilities at Coursera Curriculum
TCP/IP Framework
Welcome to the Course: Network Security & Database Vulnerabilities
Welcome to Introduction to TCP/IP Framework
Stateless Inspection
Stateful Inspection
Firewall Filters- IDS and IPS Systems
The Difference between IDS and IPS Systems
Network Address Translation
An Introduction to Local Area Networks
Ethernet and LAN - Ethernet Operations
Ethernet and LAN - Network Devices
Introduction to Basic Network Routing
Layer 2 and Layer 3 Network Addressing
Address Resolution Protocol
Routers and Routing Tables, Part 1
Routers and Routing Tables, Part 2
Routers and Routing Tables, Part 3
Earn an IBM digital badge
About this course
Research of Network Vendor Training
Introduction to the TCP/IP Protocol Framework
Network Protocols over Ethernet and Local Area Networks
Basics of Routing and Switching, Network Packets and Structures
TCP/IP Framework
Basics of IP Addressing and the OSI Model
Welcome to the Basics of IP Addressing and the OSI Model
IP Addressing - The Basics of Binary
IP Address Structure and Network Classes
IP Protocol and Traffic Routing
Introduction to the IPv6 Address Schema
Application and Transport Protocols UDP and TCP, Part 1
Application and Transport Protocols UDP and TCP, Part 2
DNS and DHCP
Syslog Message Logging Protocol
Flows and Network Analysis
Port Mirroring and Promiscuous Mode
Next Generation Firewalls - Overview
NGFW and the OSI Model
NGFW Packet Flow Example and NGFW Comparisons
Intrusion Detection and Intrusion Prevention Systems
High Availability and Clustering
Basics of IP Addressing
TCP/IP Layer 4, Transport Layer Overview
TCP/IP Layer 5, Application Layer Overview
Firewalls, Intrusion Detection and Intrusion Prevention Systems
Clustering and High Availability Systems
Basics of IP Addressing and the OSI Model
Introduction to Databases
Welcome to Introduction to Databases
Data Source Types Part 1
Data Source Types Part 2
Data Model Types
Structured Data
Securing the Crown Jewels
Leveraging Security Industry Best Practices
Structured Data and Relational Databases
Anatomy of a Vulnerability Assessment Test Report
Securing Data Sources by Type
Securing Databases Wrap Up
Data Monitoring
Data Alerts
Data Activity Reporting
Attributes to Include in Logging
Failed Access Monitoring
Suspicious Access Events, Part 1
Suspicious Access Events, Part 2
Data Breach Feeds
Types of Data
Securing Databases
A Data Protection Solution Example, IBM Security Guardium Use Cases
Introduction to Databases
Deep Dive - Injection Vulnerability
Welcome to Deep Dive - Injection Vulnerability
Introduction to Injection Flaws
OS Command Injection Part 1
OS Command Injection Part 2
OS Command Injection Part 3
SQL Injection Part 1
SQL Injection Part 2
Other Types of Injection
Thank you for attending this course
Additional Resources
Injection Vulnerability
SQL Injection
Deep Dive - Injection Vulnerability
Opt-in to receive your badge!