We may earn an affiliate commission when you visit our partners.
Course image
Jonathan S. Weissman

In this course, you will examine the various areas of network security including intrusion detection, evidence collection and defense against cyber attacks.

Read more

In this course, you will examine the various areas of network security including intrusion detection, evidence collection and defense against cyber attacks.

The issues and facilities available to both the intruder and data network administrator will also be examined to illustrate their effect.

You will learn the principles and concepts of wired and wireless data network security. You will be guided through a series of laboratories and experiments in order to explore various mechanisms for securing data networks including physical layer mechanisms, filters, applications and encryption.

You will analyze attack/defend scenarios and determine the effectiveness of particular defense deployments against attacks.

This course is a part of the RITx Cybersecurity MicroMasters Program.

What you'll learn

  • How to identify when attacks are happening inside networks
  • How to collect evidence of network intrusions
  • How to test networks and systems for vulnerabilities
  • How to prepare for and defend against network attacks

Three deals to help you save

What's inside

Learning objectives

  • How to identify when attacks are happening inside networks
  • How to collect evidence of network intrusions
  • How to test networks and systems for vulnerabilities
  • How to prepare for and defend against network attacks

Syllabus

Unit 1: Packet Sniffing
Unit 2: Password Cracking
Unit 3: Port Scanning
Unit 4: Exploits and Exploiting
Read more
Unit 5: Access Control Lists
Unit 6: Snort
Unit 7: DHCP, DNS, and Switch Attacks and Mitigations
Unit 8: Man in The Middle Attacks and Mitigations

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Covers core skills for defending against cyber attacks, such as intrusion detection and evidence collection
Taught by experts, Jonathan S. Weissman, who are recognized for their work in cybersecurity
Provides hands-on labs and interactive materials to enhance understanding and practical application
Examines both attacking and defending scenarios, giving a comprehensive perspective on network security strategies
Part of the RITx Cybersecurity MicroMasters Program, indicating alignment with industry standards and academic rigor

Save this course

Save Network Security to your list so you can find it easily later:
Save

Reviews summary

Network security: highly recommended

According to students, Network Security is highly engaging and boasts a knowledgeable instructor, Professor Weissman. Learners say the course provides a comprehensive overview of cybersecurity topics, making complex concepts easy to understand. They particularly appreciate the use of videos, animations, and demos to illustrate key points. Overall, students highly recommend this course for anyone interested in cybersecurity.
The course provides a comprehensive overview of cybersecurity topics, giving learners a solid foundation in the field.
"You get the full overall picture and enough details to take you to a new."
"I now can claim I know more than I did before and I'm very thankful."
The course uses a variety of engaging materials, including videos, animations, and demos, to illustrate key concepts.
"I enjoyed the use of lecture videos, animations and demos which clarified most confusing bits and pieces of the course."
"Complex topics explained in an easy, interesting and understandable way."
Professor Weissman is praised for his enthusiasm, clarity, and ability to make complex topics easy to understand.
"Great lecturer Prof. Jonathan S. Weissman."
"Professor Weissman is the master of cybersecurity!"
"The course was outstanding and he even connects with you on social media!"

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Network Security with these activities:
Review Basic Network Security Concepts
Establish a strong foundation in network security principles before starting the course.
Browse courses on network security
Show steps
  • Review materials from previous courses or certifications.
  • Read articles and watch videos on basic network security concepts.
  • Attend introductory webinars or workshops.
  • Complete online quizzes or practice tests to assess understanding.
Participate in a Study Group on Packet Sniffing
Collaborate with peers to develop a deep understanding of packet sniffing techniques and their applications in network security.
Browse courses on Packet Sniffing
Show steps
  • Join or form a study group with fellow students.
  • Set regular meeting times and discuss assigned topics.
  • Work together to solve problems and clarify concepts.
  • Present findings and lead discussions on specific aspects of packet sniffing.
Follow Tutorials on Snort Configuration
Gain hands-on experience in configuring and using Snort to enhance network security.
Browse courses on Snort
Show steps
  • Identify and install the latest version of Snort.
  • Follow online tutorials or documentation to configure Snort rules.
  • Set up Snort to monitor network traffic.
  • Analyze Snort alerts and take appropriate actions.
  • Create custom Snort rules to address specific threats.
Four other activities
Expand to see all activities and additional details
Show all seven activities
Create a Video Presentation on Network Intrusion Detection
Develop a clear and concise explanation of network intrusion detection systems and their role in network security.
Browse courses on Intrusion Detection
Show steps
  • Research different types of network intrusion detection systems.
  • Plan and storyboard the video presentation.
  • Record and edit the video content.
  • Add visuals and animations to enhance understanding.
  • Publish and share the video presentation.
Practice Port Scanning on Vulnerabilities
Practice identifying vulnerabilities and testing defenses using port scanning techniques.
Browse courses on Port Scanning
Show steps
  • Set up a vulnerable test environment.
  • Use port scanning tools to identify open ports.
  • Analyze scan results to identify potential vulnerabilities.
  • Test defenses to mitigate identified vulnerabilities.
  • Repeat the process to improve proficiency.
Configure a Network Firewall
Design and implement a firewall to protect a network from cyber threats.
Browse courses on Firewall Configuration
Show steps
  • Gather requirements and design the firewall configuration.
  • Choose a suitable firewall appliance or software.
  • Configure firewall rules and policies to control network traffic.
  • Test and validate the firewall configuration.
  • Monitor and maintain the firewall regularly.
Contribute to Open Source Firewall Projects
Engage with the open source community by contributing to firewall projects and gaining practical experience.
Browse courses on Open Source
Show steps
  • Identify open source firewall projects that align with interests.
  • Review the project documentation and codebase.
  • Make bug fixes or contribute new features to the project.
  • Interact with the project community on discussion forums or mailing lists.
  • Present findings or contributions at open source conferences or meetups.

Career center

Learners who complete Network Security will develop knowledge and skills that may be useful to these careers:
Information Security Analyst
Information Security Analysts are responsible for protecting an organization's information assets from threats. This course can help you develop the skills and knowledge you need to succeed in this role, such as how to identify attacks, collect evidence, and test networks for vulnerabilities. You will also learn about the principles and concepts of wired and wireless data network security.
Risk Analyst
Risk Analysts assess the risks posed to an organization's information assets. This course can help you develop the skills and knowledge you need to succeed in this role, such as how to identify attacks, collect evidence, and test networks for vulnerabilities. You will also learn about the principles and concepts of wired and wireless data network security.
IT Manager
IT Managers are responsible for planning, implementing, and managing an organization's IT systems. This course can help you develop the skills and knowledge you need to succeed in this role, such as how to identify attacks, collect evidence, and test networks for vulnerabilities. You will also learn about the principles and concepts of wired and wireless data network security.
Cybersecurity Analyst
As a Cybersecurity Analyst, you will be responsible for identifying, analyzing, and mitigating cybersecurity risks. This course can help you develop the skills and knowledge you need to succeed in this role, such as how to identify attacks, collect evidence, and test networks for vulnerabilities. You will also learn about the principles and concepts of wired and wireless data network security.
Network Security Engineer
Network Security Engineers are responsible for designing, implementing, and maintaining network security systems. This course can help you develop the skills and knowledge you need to succeed in this role, such as how to identify attacks, collect evidence, and test networks for vulnerabilities. You will also learn about the principles and concepts of wired and wireless data network security.
Security Consultant
Security Consultants provide advice and guidance to organizations on how to improve their security posture. This course can help you develop the skills and knowledge you need to succeed in this role, such as how to identify attacks, collect evidence, and test networks for vulnerabilities. You will also learn about the principles and concepts of wired and wireless data network security.
Incident Responder
Incident Responders are responsible for responding to and mitigating cybersecurity incidents. This course can help you develop the skills and knowledge you need to succeed in this role, such as how to identify attacks, collect evidence, and test networks for vulnerabilities. You will also learn about the principles and concepts of wired and wireless data network security.
Security Architect
Security Architects are responsible for designing and implementing security solutions for organizations. This course can help you develop the skills and knowledge you need to succeed in this role, such as how to identify attacks, collect evidence, and test networks for vulnerabilities. You will also learn about the principles and concepts of wired and wireless data network security.
Chief Technology Officer (CTO)
The CTO is responsible for overseeing an organization's technology strategy. This course can help you develop the skills and knowledge you need to succeed in this role, such as how to identify attacks, collect evidence, and test networks for vulnerabilities. You will also learn about the principles and concepts of wired and wireless data network security.
Chief Information Security Officer (CISO)
The CISO is responsible for overseeing an organization's security program. This course can help you develop the skills and knowledge you need to succeed in this role, such as how to identify attacks, collect evidence, and test networks for vulnerabilities. You will also learn about the principles and concepts of wired and wireless data network security.
IT Director
IT Directors are responsible for overseeing an organization's IT department. This course can help you develop the skills and knowledge you need to succeed in this role, such as how to identify attacks, collect evidence, and test networks for vulnerabilities. You will also learn about the principles and concepts of wired and wireless data network security.
Forensic Analyst
Forensic Analysts investigate computer crimes and collect evidence. This course can help you develop the skills and knowledge you need to succeed in this role, such as how to identify attacks, collect evidence, and test networks for vulnerabilities. You will also learn about the principles and concepts of wired and wireless data network security.
Chief Security Officer (CSO)
The CSO is responsible for overseeing an organization's security strategy. This course can help you develop the skills and knowledge you need to succeed in this role, such as how to identify attacks, collect evidence, and test networks for vulnerabilities. You will also learn about the principles and concepts of wired and wireless data network security.
Chief Risk Officer (CRO)
The CRO is responsible for overseeing an organization's risk management program. This course can help you develop the skills and knowledge you need to succeed in this role, such as how to identify attacks, collect evidence, and test networks for vulnerabilities. You will also learn about the principles and concepts of wired and wireless data network security.
Chief Privacy Officer (CPO)
The CPO is responsible for overseeing an organization's privacy program. This course can help you develop the skills and knowledge you need to succeed in this role, such as how to identify attacks, collect evidence, and test networks for vulnerabilities. You will also learn about the principles and concepts of wired and wireless data network security.

Reading list

We've selected ten books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Network Security.
Provides a comprehensive overview of network security, covering topics such as firewalls, intrusion detection systems, and encryption. It useful reference for anyone who wants to learn more about network security.
Provides a more in-depth look at the principles of computer security. It good choice for students who want to learn more about the theoretical foundations of network security.
Focuses on the practical aspects of network security monitoring. It good choice for students who want to learn how to detect and respond to network attacks.
Provides a comprehensive overview of computer networks. It good choice for students who want to learn more about the underlying technologies that are used to create networks.
Provides a comprehensive overview of secure software development. It good choice for students who want to learn how to develop secure software applications.
Provides a comprehensive overview of web application security. It good choice for students who want to learn how to protect web applications from attacks.
Provides a comprehensive overview of cloud security. It good choice for students who want to learn how to protect cloud-based applications and data.
Provides a comprehensive overview of big data security. It good choice for students who want to learn how to protect big data applications and data.
Provides a comprehensive overview of cybersecurity for non-technical professionals. It good choice for students who want to learn about cybersecurity without getting too technical.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Network Security.
Cisco Firepower Fundamentals
Most relevant
IT Security Champion: Network Security Monitoring
Most relevant
Aruba Network Security Basics
Most relevant
In the Trenches: Security Operations Center
Most relevant
Connect and Protect: Networks and Network Security
Most relevant
Active Defense with PowerShell
Most relevant
DDoS Attacks and Defenses
Most relevant
PHP 8 Web Application Security
Most relevant
Configuring Firepower Threat Defense (FTD) NetOps Features
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser