Coursera
Coursera Logo

Networks and Communications Security 

  • Offered byCoursera

Networks and Communications Security
 at 
Coursera 
Overview

Duration

20 hours

Start from

Start Now

Total fee

Free

Mode of learning

Online

Difficulty level

Beginner

Official Website

Explore Free Course External Link Icon

Credential

Certificate

Networks and Communications Security
 at 
Coursera 
Highlights

  • Shareable Certificate Earn a Certificate upon completion
  • 100% online Start instantly and learn at your own schedule.
  • Course 5 of 6 in the (ISC)² Systems Security Certified Practitioner (SSCP)
  • Flexible deadlines Reset deadlines in accordance to your schedule.
  • Beginner Level
  • Approx. 20 hours to complete
  • English Subtitles: English
Read more
Details Icon

Networks and Communications Security
 at 
Coursera 
Course details

Skills you will learn
More about this course
  • Welcome to Networks and Communications Security Course!
  • In the Networks and Communications Security Course, you will learn about the network structure, data transmission methods, transport formats, and the security measures used to maintain integrity, availability, authentication, and confidentiality of the information being transmitted.
  • Concepts for both public and private communication networks will be discussed.
  • Course Objectives
  • 1. Describe network-related security issues
  • 2. Identify protective measures for telecommunication technologies
  • 3. Define processes for controlling network access
  • 4. Identify processes for managing LAN-based security
  • 5. Describe procedures for operating and configuring networked-based
  • security devices
  • 6. Define procedures to implement and operate wireless technologies
Read more

Networks and Communications Security
 at 
Coursera 
Curriculum

Understand Security Issues Related to Networks

Networks and Communications Security

Understand Security Issues: OSI Model (Layers 4, 5, 6, and 7)

Understand Security Issues: OSI Model (Layers 1,2, and 3)

Understand Security Issues: OSI Model

Understand Security Issues: Layers Review

Understand Security Issues: Layers Review

Understand Security Issues: IP Networking

Understand Security Issues: Network Classes

Understand Security Issues: IPv6

Understand Security Issues: DHCP

Understand Security Issues: DHCP

Understand Security Issues: ICMP

Understand Security Issues: Ping Scanning

Understand Security Issues: RPC

Understand Security Issues: Ring

Understand Security Issues: Unicast, Multicast, and Broadcast Transmissions

Understand Security Issues: Packet-Switched Networks

Understand Security Issues: CSMA

Understand Security Issues: FDDI

Understand Security Issues: DNS

Understand Security Issues: DNS

Understand Security Issues: DNS Quick Reference

Understand Security Issues: FTP

Understand Security Issues: Proxies

Understand Security Issues: HTTP Tunneling

Understand Security Issues: SCADA Attacks

Networks and Communications Security

Understand Security Issues: OSI Model (Layers 4, 5, 6, and 7)

Understand Security Issues: OSI Model (Layers 1,2, and 3)

Understand Security Issues: Layers Review

Understand Security Issues: Layers Review

Understand Security Issues: IP Networking

Understand Security Issues: Network Classes

Understand Security Issues: IPv6

Understand Security Issues: DHCP

Understand Security Issues: DHCP

Understand Security Issues: ICMP

Understand Security Issues: Ping Scanning

Understand Security Issues: RPC

Understand Security Issues: Ring

Understand Security Issues: Unicast, Multicast, and Broadcast Transmissions

Understand Security Issues: Packet-Switched Networks

Understand Security Issues: CSMA

Understand Security Issues: FDDI

Understand Security Issues: DNS Quick Reference

Understand Security Issues: FTP

Understand Security Issues: Proxies

Understand Security Issues: HTTP Tunneling

Understand Security Issues: SCADA Attacks

Quiz 1

Protect Telecommunications Technologies and Control Network Access

Protect Telecommunications Technologies: IP Convergence

Protect Telecommunications Technologies: MPLS

Protect Telecommunications Technologies: MPLS L3 VPNs

Protect Telecommunications Technologies: SIP

Control Network Access: Access Control and Monitoring

Control Network Access: Blind Spoofing

Control Network Access: Bastion Host

Control Network Access: Wired Transmissions

Control Network Access: Patch Panels

Control Network Access: Remote Meeting Technology

Control Network Access: PPTP

Control Network Access: SNMP

Control Network Access: Virtual Network Terminal Services

Protect Telecommunications Technologies: IP Convergence

Protect Telecommunications Technologies: MPLS

Protect Telecommunications Technologies: MPLS L3 VPNs

Protect Telecommunications Technologies: SIP

Control Network Access: Access Control and Monitoring

Control Network Access: Blind Spoofing

Control Network Access: Bastion Host

Control Network Access: Wired Transmissions

Control Network Access: Patch Panels

Control Network Access: Remote Meeting Technology

Control Network Access: PPTP

Control Network Access: SNMP

Control Network Access: Virtual Network Terminal Services

Quiz 2

Operate and Configure Network-Based Security Devices

Network-Based Security Devices: Network as a Bastion of Defense

Network-Based Security Devices: Availability

Network-Based Security Devices: Open Mail Relay Servers

Network-Based Security Devices: NAT

Network-Based Security Devices: Proxies

Network-Based Security Devices: FIN, NULL, and XMAS Scanning

Network-Based Security Devices: IDS

Network-Based Security Devices: IP Fragmentation Attacks and Crafted Packets

Network-Based Security Devices: Smurf and Fraggle Attacks

Network-Based Security Devices: DoS

Network-Based Security Devices: Manipulation of DNS Queries

Network-Based Security Devices: Network as a Bastion of Defense

Network-Based Security Devices: Availability

Network-Based Security Devices: Open Mail Relay Servers

Network-Based Security Devices: NAT

Network-Based Security Devices: Proxies

Network-Based Security Devices: FIN, NULL, and XMAS Scanning

Network-Based Security Devices: IDS

Network-Based Security Devices: IP Fragmentation Attacks and Crafted Packets

Network-Based Security Devices: Smurf and Fraggle Attacks

Network-Based Security Devices: DoS

Network-Based Security Devices: Manipulation of DNS Queries

Quiz 3

Manage LAN-Based Security and Implement and Operate Wireless Technologies

LAN-Based Security: Separation of Data Plane and Control Plane

LAN-Based Security: Segmentation

LAN-Based Security: How Does Tagging Work?

LAN-Based Security: Common Attacks Against the Data-Link Layer

LAN-Based Security: Secure Device Management

LAN-Based Security: DNSSEC

Implement and Operate Wireless Technologies: Types of Wireless Technologies

Implement and Operate Wireless Technologies: TDMA

Implement and Operate Wireless Technologies: Infrastructure Mode

Implement and Operate Wireless Technologies: Share Key Authentication Flaw

LAN-Based Security: Separation of Data Plane and Control Plane

LAN-Based Security: Segmentation

LAN-Based Security: How Does Tagging Work?

LAN-Based Security: Common Attacks Against the Data-Link Layer

LAN-Based Security: Secure Device Management

LAN-Based Security: DNSSEC

Implement and Operate Wireless Technologies: Types of Wireless Technologies

Implement and Operate Wireless Technologies: TDMA

Implement and Operate Wireless Technologies: Infrastructure Mode

Implement and Operate Wireless Technologies: Share Key Authentication Flaw

Quiz 4

Case Study

End-Of Course Assessment

SSCP Exam Information

Networks and Communications Security Assessment

Networks and Communications Security
 at 
Coursera 
Admission Process

    Important Dates

    May 25, 2024
    Course Commencement Date

    Other courses offered by Coursera

    – / –
    3 months
    Beginner
    – / –
    20 hours
    Beginner
    – / –
    2 months
    Beginner
    – / –
    3 months
    Beginner
    View Other 6714 CoursesRight Arrow Icon
    qna

    Networks and Communications Security
     at 
    Coursera 

    Student Forum

    chatAnything you would want to ask experts?
    Write here...