Networks and Communications Security
- Offered byCoursera
Networks and Communications Security at Coursera Overview
Duration | 20 hours |
Start from | Start Now |
Total fee | Free |
Mode of learning | Online |
Difficulty level | Beginner |
Official Website | Explore Free Course |
Credential | Certificate |
Networks and Communications Security at Coursera Highlights
- Shareable Certificate Earn a Certificate upon completion
- 100% online Start instantly and learn at your own schedule.
- Course 5 of 6 in the (ISC)² Systems Security Certified Practitioner (SSCP)
- Flexible deadlines Reset deadlines in accordance to your schedule.
- Beginner Level
- Approx. 20 hours to complete
- English Subtitles: English
Networks and Communications Security at Coursera Course details
- Welcome to Networks and Communications Security Course!
- In the Networks and Communications Security Course, you will learn about the network structure, data transmission methods, transport formats, and the security measures used to maintain integrity, availability, authentication, and confidentiality of the information being transmitted.
- Concepts for both public and private communication networks will be discussed.
- Course Objectives
- 1. Describe network-related security issues
- 2. Identify protective measures for telecommunication technologies
- 3. Define processes for controlling network access
- 4. Identify processes for managing LAN-based security
- 5. Describe procedures for operating and configuring networked-based
- security devices
- 6. Define procedures to implement and operate wireless technologies
Networks and Communications Security at Coursera Curriculum
Understand Security Issues Related to Networks
Networks and Communications Security
Understand Security Issues: OSI Model (Layers 4, 5, 6, and 7)
Understand Security Issues: OSI Model (Layers 1,2, and 3)
Understand Security Issues: OSI Model
Understand Security Issues: Layers Review
Understand Security Issues: Layers Review
Understand Security Issues: IP Networking
Understand Security Issues: Network Classes
Understand Security Issues: IPv6
Understand Security Issues: DHCP
Understand Security Issues: DHCP
Understand Security Issues: ICMP
Understand Security Issues: Ping Scanning
Understand Security Issues: RPC
Understand Security Issues: Ring
Understand Security Issues: Unicast, Multicast, and Broadcast Transmissions
Understand Security Issues: Packet-Switched Networks
Understand Security Issues: CSMA
Understand Security Issues: FDDI
Understand Security Issues: DNS
Understand Security Issues: DNS
Understand Security Issues: DNS Quick Reference
Understand Security Issues: FTP
Understand Security Issues: Proxies
Understand Security Issues: HTTP Tunneling
Understand Security Issues: SCADA Attacks
Networks and Communications Security
Understand Security Issues: OSI Model (Layers 4, 5, 6, and 7)
Understand Security Issues: OSI Model (Layers 1,2, and 3)
Understand Security Issues: Layers Review
Understand Security Issues: Layers Review
Understand Security Issues: IP Networking
Understand Security Issues: Network Classes
Understand Security Issues: IPv6
Understand Security Issues: DHCP
Understand Security Issues: DHCP
Understand Security Issues: ICMP
Understand Security Issues: Ping Scanning
Understand Security Issues: RPC
Understand Security Issues: Ring
Understand Security Issues: Unicast, Multicast, and Broadcast Transmissions
Understand Security Issues: Packet-Switched Networks
Understand Security Issues: CSMA
Understand Security Issues: FDDI
Understand Security Issues: DNS Quick Reference
Understand Security Issues: FTP
Understand Security Issues: Proxies
Understand Security Issues: HTTP Tunneling
Understand Security Issues: SCADA Attacks
Quiz 1
Protect Telecommunications Technologies and Control Network Access
Protect Telecommunications Technologies: IP Convergence
Protect Telecommunications Technologies: MPLS
Protect Telecommunications Technologies: MPLS L3 VPNs
Protect Telecommunications Technologies: SIP
Control Network Access: Access Control and Monitoring
Control Network Access: Blind Spoofing
Control Network Access: Bastion Host
Control Network Access: Wired Transmissions
Control Network Access: Patch Panels
Control Network Access: Remote Meeting Technology
Control Network Access: PPTP
Control Network Access: SNMP
Control Network Access: Virtual Network Terminal Services
Protect Telecommunications Technologies: IP Convergence
Protect Telecommunications Technologies: MPLS
Protect Telecommunications Technologies: MPLS L3 VPNs
Protect Telecommunications Technologies: SIP
Control Network Access: Access Control and Monitoring
Control Network Access: Blind Spoofing
Control Network Access: Bastion Host
Control Network Access: Wired Transmissions
Control Network Access: Patch Panels
Control Network Access: Remote Meeting Technology
Control Network Access: PPTP
Control Network Access: SNMP
Control Network Access: Virtual Network Terminal Services
Quiz 2
Operate and Configure Network-Based Security Devices
Network-Based Security Devices: Network as a Bastion of Defense
Network-Based Security Devices: Availability
Network-Based Security Devices: Open Mail Relay Servers
Network-Based Security Devices: NAT
Network-Based Security Devices: Proxies
Network-Based Security Devices: FIN, NULL, and XMAS Scanning
Network-Based Security Devices: IDS
Network-Based Security Devices: IP Fragmentation Attacks and Crafted Packets
Network-Based Security Devices: Smurf and Fraggle Attacks
Network-Based Security Devices: DoS
Network-Based Security Devices: Manipulation of DNS Queries
Network-Based Security Devices: Network as a Bastion of Defense
Network-Based Security Devices: Availability
Network-Based Security Devices: Open Mail Relay Servers
Network-Based Security Devices: NAT
Network-Based Security Devices: Proxies
Network-Based Security Devices: FIN, NULL, and XMAS Scanning
Network-Based Security Devices: IDS
Network-Based Security Devices: IP Fragmentation Attacks and Crafted Packets
Network-Based Security Devices: Smurf and Fraggle Attacks
Network-Based Security Devices: DoS
Network-Based Security Devices: Manipulation of DNS Queries
Quiz 3
Manage LAN-Based Security and Implement and Operate Wireless Technologies
LAN-Based Security: Separation of Data Plane and Control Plane
LAN-Based Security: Segmentation
LAN-Based Security: How Does Tagging Work?
LAN-Based Security: Common Attacks Against the Data-Link Layer
LAN-Based Security: Secure Device Management
LAN-Based Security: DNSSEC
Implement and Operate Wireless Technologies: Types of Wireless Technologies
Implement and Operate Wireless Technologies: TDMA
Implement and Operate Wireless Technologies: Infrastructure Mode
Implement and Operate Wireless Technologies: Share Key Authentication Flaw
LAN-Based Security: Separation of Data Plane and Control Plane
LAN-Based Security: Segmentation
LAN-Based Security: How Does Tagging Work?
LAN-Based Security: Common Attacks Against the Data-Link Layer
LAN-Based Security: Secure Device Management
LAN-Based Security: DNSSEC
Implement and Operate Wireless Technologies: Types of Wireless Technologies
Implement and Operate Wireless Technologies: TDMA
Implement and Operate Wireless Technologies: Infrastructure Mode
Implement and Operate Wireless Technologies: Share Key Authentication Flaw
Quiz 4
Case Study
End-Of Course Assessment
SSCP Exam Information
Networks and Communications Security Assessment