We may earn an affiliate commission when you visit our partners.
Course image
(ISC)² Education & Training

Welcome to course 4 of 5 of this Specialization, Network Security.

Read more

Welcome to course 4 of 5 of this Specialization, Network Security.

In this course, we will look at computer networking and securing the network. In today’s world, the internet connects nearly everyone and everything, and this is accomplished through networking. While most see computer networking as a positive, criminals routinely use the internet, and the networking protocols themselves, as weapons and tools to exploit vulnerabilities and for this reason we must do our best to secure the network. We will review the basic components of a network, threats and attacks to the network, and learn how to protect them from attackers. Network security itself can be a specialty career within cybersecurity; however, all information security professionals need to understand how networks operate and are exploited to better secure them.

After completing this chapter, the participant will be able to: 

Explain the concepts of network security.

- Recognize common networking terms and models.

- Identify common protocols and ports and their secure counterparts.

- Identify types of network (cyber) threats and attacks.

- Discuss common tools used to identify and prevent threats.

- Identify common data center terminology.

- Recognize common cloud service terminology.

- Identify secure network design terminology.

- Practice the terminology of and review network security concepts.

Agenda

Course Introduction

Module 1: Network Concepts and Models

Module 2: Common Network Threats and Attacks

Module 3: Network Security Infrastructure

Module 4: Network Security Review

This training is for IT professionals, career changers, college students, recent college graduates, advanced high school students and recent high school graduates looking to start their path toward cybersecurity leadership by taking the Certified in Cybersecurity entry-level exam.

There are no prerequisites to take the training or the exam. It is recommended that candidates have basic Information Technology (IT) knowledge. No work experience in cybersecurity or formal education diploma/degree is required.

Enroll now

What's inside

Syllabus

Course Introduction
In this course, we will look at computer networking and securing the network. In today’s world, the internet connects nearly everyone and everything, and this is accomplished through networking. While most see computer networking as a positive, criminals routinely use the internet, and the networking protocols themselves, as weapons and tools to exploit vulnerabilities and for this reason we must do our best to secure the network. We will review the basic components of a network, threats and attacks to the network, and learn how to protect them from attackers. Network security itself can be a specialty career within cybersecurity; however, all information security professionals need to understand how networks operate and are exploited to better secure them.
Read more
Network Concepts and Models
Throughout this module, we will focus on Network Concepts and Models.
Common Network Threats and Attacks
Throughout this module, we will focus on Common Network Threats and Attacks.
Network Security Infrastructure
Throughout this module, we will focus on Network Security Infrastructure.
Network Security Review
This module will test your knowledge on what you have learned throughout this course.

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Introduces basic networking concepts that help learners build a strong foundation, which is standard across cybersecurity
Taught by (ISC)² Education & Training, who are recognized for their work in the cybersecurity field
Examines network security, which is highly relevant to cybersecurity roles and certifications
Covers core concepts within cybersecurity, such as common network threats and attacks, network security infrastructure, and secure network design terminology
Emphasizes industry-standard protocols and terms, helping learners build a solid technical foundation
Requires no prerequisites, making this accessible to beginners in cybersecurity

Save this course

Save Network Security to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Network Security with these activities:
Review network terminology
Review foundational network terminology to strengthen understanding of networking concepts.
Show steps
  • Identify key networking terms and protocols.
  • Define and explain the concepts of TCP/IP, MAC addresses, and subnetting.
  • Describe the different types of network topologies.
Review 'Network Security Essentials'
Review a comprehensive textbook to reinforce your understanding of network security principles and practices.
Show steps
  • Read and comprehend key chapters related to the course content.
  • Summarize and highlight important concepts.
  • Complete end-of-chapter exercises and review questions.
Work through network security tutorials
Follow guided tutorials to gain hands-on experience with network security tools and techniques.
Browse courses on Security Best Practices
Show steps
  • Find reputable online tutorials on network security.
  • Choose tutorials that align with your skill level.
  • Follow the instructions carefully and complete the exercises.
Three other activities
Expand to see all activities and additional details
Show all six activities
Complete network security practice exercises
Engage in practical exercises to enhance your ability to identify and mitigate network security risks.
Show steps
  • Find reputable online platforms or courses that offer practice exercises.
  • Choose exercises that align with your skill level.
  • Complete the exercises carefully and troubleshoot any issues.
Build a network security tool repository
Compile a collection of useful network security tools and resources to aid in your learning and practice.
Browse courses on Network Security Tools
Show steps
  • Research and identify valuable network security tools.
  • Categorize and organize the tools based on their functions.
  • Create a central repository (e.g., a document, spreadsheet, or online platform) to store the tools.
Create a network security plan
Develop a comprehensive network security plan to strengthen your understanding of security measures and best practices.
Show steps
  • Identify potential network threats and vulnerabilities.
  • Research and select appropriate security controls.
  • Document the security plan and implementation strategy.

Career center

Learners who complete Network Security will develop knowledge and skills that may be useful to these careers:
Network Security Engineer
A Network Security Engineer designs, implements, and maintains the security of computer networks. This course offers a strong foundation for a Network Security Engineer because it teaches about network security infrastructure. The course also covers how to identify and prevent threats, which can help a Network Security Engineer protect networks from attackers.
Cybersecurity Engineer
A Cybersecurity Engineer designs, implements, and maintains the security of computer networks and systems. This course offers a strong foundation for a Cybersecurity Engineer because it teaches about network security infrastructure. The course also covers how to identify and prevent threats, which can help a Cybersecurity Engineer protect networks from attackers.
Information Security Analyst
An Information Security Analyst protects computer networks and systems from unauthorized access, use, disclosure, disruption, modification, or destruction. This course can help an Information Security Analyst protect networks by teaching them about the most common threats and attacks to the network and how to prevent them. The course may also be helpful in teaching an Information Security Analyst how to identify and prevent threats through the use of tools.
Security Consultant
A Security Consultant helps organizations improve their security posture. This course can help a Security Consultant by teaching them about the most common threats and attacks to the network and how to prevent them. The course may also be helpful in teaching a Security Consultant how to identify and prevent threats through the use of tools.
Cybersecurity Analyst
A Cybersecurity Analyst protects computer networks and systems from unauthorized access, use, disclosure, disruption, modification, or destruction. This course may be useful to a Cybersecurity Analyst because it teaches about the most common threats and attacks to the network and how to prevent them. The course may also be helpful in teaching a Cybersecurity Analyst how to identify and prevent threats through the use of tools.
Security Analyst
A Security Analyst investigates and responds to security incidents. This course can help a Security Analyst by teaching them about the most common threats and attacks to the network and how to prevent them. The course also teaches about common networking terms and models, protocols and ports, and data center and cloud service terminology.
Information Security Manager
An Information Security Manager is responsible for developing and implementing an organization's information security program. This course can help an Information Security Manager by teaching them about the most common threats and attacks to the network and how to prevent them. The course also teaches about common networking terms and models, protocols and ports, and data center and cloud service terminology. In addition, this course may be useful to an Information Security Manager because it teaches about network security infrastructure.
Chief Information Security Officer (CISO)
A Chief Information Security Officer (CISO) is responsible for the overall security of an organization's information technology (IT) systems. This course can help a CISO by teaching them about the most common threats and attacks to the network and how to prevent them. The course also teaches about common networking terms and models, protocols and ports, and data center and cloud service terminology. In addition, this course may be useful to a CISO because it teaches about network security infrastructure.
Cloud Security Architect
A Cloud Security Architect designs and implements security solutions for cloud computing environments. This course may be useful to a Cloud Security Architect because it teaches about common networking terms and models, protocols and ports, data center and cloud service terminology, and secure network design terminology. The course can also help a Cloud Security Architect protect networks from attackers by teaching them about the most common threats and attacks to the network and how to prevent them.
Network Administrator
A Network Administrator is responsible for the day-to-day operations of a computer network. This course may be useful to a Network Administrator because it teaches about the basic components of a network, threats and attacks to the network, and how to protect them from attackers. The course also teaches about common networking terms and models, protocols and ports, and data center and cloud service terminology.
IT Manager
An IT Manager is responsible for the day-to-day operations of an IT department. This course may be useful to an IT Manager because it teaches about common networking terms and models, protocols and ports, and data center and cloud service terminology. The course also teaches about network security infrastructure.
Network Architect
A Network Architect designs and implements computer networks. This course may be useful to a Network Architect because it teaches about common networking terms and models, protocols and ports, data center and cloud service terminology, and secure network design terminology. The course can also help a Network Architect protect networks from attackers by teaching them about the most common threats and attacks to the network and how to prevent them.
IT Auditor
An IT Auditor evaluates the security of computer networks and systems. This course may be useful to an IT Auditor because it teaches about the most common threats and attacks to the network and how to prevent them. The course also teaches about common networking terms and models, protocols and ports, and data center and cloud service terminology.
IT Director
An IT Director is responsible for the strategic direction of an organization's IT department. This course may be useful to an IT Director because it teaches about common networking terms and models, protocols and ports, and data center and cloud service terminology. The course also teaches about network security infrastructure.
DevOps Engineer
A DevOps Engineer is responsible for the development and deployment of software applications. This course may be useful to a DevOps Engineer because it teaches about common networking terms and models, protocols and ports, and data center and cloud service terminology. The course can also help a DevOps Engineer protect networks from attackers by teaching them about the most common threats and attacks to the network and how to prevent them.

Reading list

We've selected ten books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Network Security.
Provides a comprehensive overview of security engineering, covering topics such as risk assessment, threat modeling, and security controls.
Provides a comprehensive overview of cryptography and network security, covering topics such as encryption, authentication, and public key infrastructure.
Will provide students with a hands-on guide to penetration testing, covering topics such as reconnaissance, exploitation, and post-exploitation.
Provides a practical guide to threat modeling, covering topics such as threat identification, risk assessment, and mitigation strategies.
Provides a practical introduction to hacking, covering topics such as reconnaissance, exploitation, and post-exploitation.
Provides a comprehensive reference for cybersecurity, covering topics such as network security, cryptography, and intrusion detection.
This textbook provides a comprehensive overview of network security, covering topics such as cryptography, network attacks, and security protocols.
This study guide will help students prepare for the CompTIA Network+ certification exam, covering topics such as network fundamentals, security, and troubleshooting.
Provides a unique perspective on network security, examining the human element and how it can be exploited by attackers.
This textbook provides a comprehensive overview of networking, including topics such as network architecture, protocols, and security.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Network Security.
Industrial Cybersecurity
Most relevant
Security Operations
Most relevant
Cybersecurity Fundamentals - Become a Security Expert
Most relevant
Security Concepts for Cisco CyberOps Associate
Most relevant
Threat Intelligence in Cybersecurity
Most relevant
Connect and Protect: Networks and Network Security
Most relevant
Introduction to Networking and Cloud Computing
Most relevant
Digital Shield: Cybersecurity for Data and System...
Most relevant
Home Networking Basics
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser