We may earn an affiliate commission when you visit our partners.
Course image
Milind Adari

Get comprehensive training on how to design a secure network architecture for your enterprise with Udacity's online Enterprise Network Security Training Course

Prerequisite details

Read more

Get comprehensive training on how to design a secure network architecture for your enterprise with Udacity's online Enterprise Network Security Training Course

Prerequisite details

To optimize your success in this program, we've created a list of prerequisites and recommendations to help you prepare for the curriculum. Prior to enrolling, you should have the following knowledge:

  • Basic Linux
  • Client-server model
  • Cloud environment configuration
  • Computer networking basics

You will also need to be able to communicate fluently and professionally in written and spoken English.

What's inside

Syllabus

In this introductory lesson, we'll give you a helpful overview of the course that will set you up for success!
In this lesson we'll provide you an introduction to network security architecture for enterprise.
Read more
In this lesson we are going to take all the concepts we learned from Network Security Architecture and use them to build our own secure enterprise network in Microsoft Azure.
In this lesson we'll learn how to set up continuous monitoring for our enterprise network through the use of a SIEM.
In this lesson we'll introduce you to a new school of thought in how enterprises should best secure their network - Zero Trust.
In this project, you'll design a secure network architecture for a simulated business context, build that design in Azure, set up monitoring with a SIEM, and create a Zero Trust Model.

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Appropriate for learners with basic knowledge of Linux, client-server model, cloud environment configuration, and computer networking basics
Facilitates hands-on learning through real-time lab exercises on Microsoft Azure
Builds foundational knowledge in network security architecture, monitoring, and Zero Trust principles
Taught by industry experts with proven experience in enterprise network security
Requires prior experience in working with network operations
May necessitate additional research or learning to bridge any knowledge gaps in specific areas

Save this course

Save Enterprise Perimeter and Network Security to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Enterprise Perimeter and Network Security with these activities:
Review the basic principles of computer networking
A strong understanding of computer networking will make it easier for you to understand the concepts covered in this course.
Show steps
  • Read a book or article on computer networking
  • Watch a video tutorial on computer networking
  • Take a practice quiz on computer networking
Read 'Enterprise Network Security' by William Stallings
This book provides a comprehensive overview of enterprise network security.
Show steps
  • Read Chapter 1-3
  • Read Chapter 5-7
  • Read Chapter 9-11
Attend a study group or discussion forum on enterprise network security
Engaging with other students can help reinforce your understanding of the material.
Show steps
  • Find a study group or discussion forum on enterprise network security
  • Attend the study group or discussion forum
  • Participate in the discussion
Three other activities
Expand to see all activities and additional details
Show all six activities
Practice setting up a network in Microsoft Azure
Setting up a network in Microsoft Azure will give you practical experience with the concepts covered in the course.
Show steps
  • Create a Microsoft Azure account
  • Create a virtual network
  • Create a subnet
  • Create a network security group
  • Configure the network security group
Follow a tutorial on setting up a SIEM in Microsoft Azure
Following a tutorial on setting up a SIEM will show you how to implement this important security measure.
Browse courses on SIEM
Show steps
  • Find a tutorial on setting up a SIEM in Microsoft Azure
  • Follow the tutorial steps
  • Test the SIEM
Write a blog post or article on a topic related to enterprise network security
Creating content can help you synthesize and retain the information you've learned.
Show steps
  • Choose a topic related to enterprise network security
  • Research the topic
  • Write the blog post or article
  • Publish the blog post or article

Career center

Learners who complete Enterprise Perimeter and Network Security will develop knowledge and skills that may be useful to these careers:
Cloud Security Engineer
A Cloud Security Engineer is responsible for securing cloud computing environments. They may be involved in designing, implementing, and maintaining security controls, as well as monitoring and responding to security incidents. This course may be useful in helping you gain the skills and knowledge you need to succeed in this role. The course will help you learn how to design and implement a secure network architecture in the cloud, as well as how to monitor and respond to security incidents in the cloud.
Information Security Analyst
An Information Security Analyst is responsible for protecting an organization's information assets from unauthorized access, use, disclosure, disruption, modification, or destruction. They may be involved in developing and implementing security policies and procedures, as well as conducting security audits and assessments. This course may be useful in helping you gain the skills and knowledge you need to succeed in this role. The course will help you learn how to design and implement a secure network architecture, as well as how to monitor and respond to security incidents.
Network Security Engineer
A Network Security Engineer designs, implements, and maintains network security systems to protect an organization's computer networks from unauthorized access, use, disclosure, disruption, modification, or destruction. They may also be responsible for developing and implementing security policies and procedures, as well as conducting security audits and assessments. This course may be useful in helping you gain the skills and knowledge you need to succeed in this role. The course will help you learn how to design and implement a secure network architecture, as well as how to monitor and respond to security incidents.
Security Architect
A Security Architect is responsible for designing and implementing an organization's security architecture. They may be involved in developing security policies and procedures, as well as designing and implementing security controls. This course may be useful in helping you gain the skills and knowledge you need to succeed in this role. The course will help you learn how to design and implement a secure network architecture, as well as how to monitor and respond to security incidents.
Security Manager
A Security Manager is responsible for overseeing an organization's security program. They may be involved in developing and implementing security policies and procedures, as well as managing security staff and resources. This course may be useful in helping you gain the skills and knowledge you need to succeed in this role. The course will help you learn how to design and implement a secure network architecture, as well as how to monitor and respond to security incidents.
Network Administrator
A Network Administrator is responsible for managing and maintaining an organization's computer networks. They may be involved in installing, configuring, and maintaining network hardware and software, as well as monitoring and responding to network problems. This course may be useful in helping you gain the skills and knowledge you need to succeed in this role. The course will help you learn how to design and implement a secure network architecture, as well as how to monitor and respond to network security incidents.
Systems Administrator
A Systems Administrator is responsible for managing and maintaining an organization's computer systems. They may be involved in installing, configuring, and maintaining operating systems, software, and hardware, as well as monitoring and responding to system problems. This course may be useful in helping you gain the skills and knowledge you need to succeed in this role. The course will help you learn how to design and implement a secure network architecture, as well as how to monitor and respond to network security incidents.
Security Consultant
A Security Consultant is responsible for providing security advice and services to organizations. They may be involved in conducting security assessments, developing security plans, and implementing security controls. This course may be useful in helping you gain the skills and knowledge you need to succeed in this role. The course will help you learn how to design and implement a secure network architecture, as well as how to monitor and respond to security incidents.
Chief Information Security Officer (CISO)
A Chief Information Security Officer (CISO) is responsible for overseeing an organization's information security program. They may be involved in developing and implementing security policies and procedures, as well as managing security staff and resources. This course may be useful in helping you gain the skills and knowledge you need to succeed in this role. The course will help you learn how to design and implement a secure network architecture, as well as how to monitor and respond to security incidents.
Network Architect
A Network Architect is responsible for designing and implementing an organization's computer networks. They may be involved in developing network topologies, selecting network hardware and software, and configuring network devices. This course may be useful in helping you gain the skills and knowledge you need to succeed in this role. The course will help you learn how to design and implement a secure network architecture.
Compliance Manager
A Compliance Manager is responsible for ensuring that an organization complies with regulations and standards. They may be involved in developing and implementing compliance policies and procedures, as well as conducting compliance audits. This course may be useful in helping you gain the skills and knowledge you need to succeed in this role. The course will help you learn how to design and implement a secure network architecture that complies with regulations.
Risk Manager
A Risk Manager is responsible for identifying, assessing, and mitigating risks to an organization. They may be involved in developing and implementing risk management plans, as well as conducting risk assessments. This course may be useful in helping you gain the skills and knowledge you need to succeed in this role. The course will help you learn how to design and implement a secure network architecture that mitigates risks.
Chief Technology Officer (CTO)
A Chief Technology Officer (CTO) is responsible for overseeing an organization's technology strategy and operations. They may be involved in developing and implementing technology plans, as well as managing technology staff and resources. This course may be useful in helping you gain the skills and knowledge you need to succeed in this role. The course will help you learn how to design and implement a secure network architecture, as well as how to manage and oversee technology systems and resources.
IT Auditor
An IT Auditor is responsible for auditing an organization's IT systems and processes to ensure that they are secure and compliant with regulations. They may be involved in conducting security audits, developing security plans, and implementing security controls. This course may be useful in helping you gain the skills and knowledge you need to succeed in this role. The course will help you learn how to design and implement a secure network architecture, as well as how to monitor and respond to security incidents.
Information Technology Manager
An Information Technology Manager is responsible for managing and overseeing an organization's IT systems and resources. They may be involved in planning, implementing, and managing IT projects, as well as managing IT staff and resources. This course may be useful in helping you gain the skills and knowledge you need to succeed in this role. The course will help you learn how to design and implement a secure network architecture, as well as how to manage and oversee IT systems and resources.

Reading list

We've selected nine books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Enterprise Perimeter and Network Security.
Provides a comprehensive overview of zero trust networks, covering topics such as the zero trust model, zero trust architecture, and zero trust implementation. It great resource for anyone who wants to learn more about zero trust networks.
Provides a comprehensive overview of computer networking, covering topics such as network protocols, network architectures, and network security. It great resource for anyone who wants to learn more about computer networking.
Provides a comprehensive overview of network security, covering topics such as network security protocols, intrusion detection, and firewalls. It great resource for anyone who wants to learn more about network security.
Provides a comprehensive overview of network security with OpenSSL, covering topics such as SSL/TLS, VPNs, and PKI. It great resource for anyone who wants to learn more about network security with OpenSSL.
Provides a comprehensive overview of Wireshark, covering topics such as Wireshark installation, Wireshark configuration, and Wireshark troubleshooting. It great resource for anyone who wants to learn more about Wireshark.
Provides a comprehensive overview of network security assessment, covering topics such as network security assessment tools, network security assessment techniques, and network security assessment reporting. It great resource for anyone who wants to learn more about network security assessment.
Provides a comprehensive overview of security engineering, covering topics such as security principles, security threats, and security controls. It great resource for anyone who wants to learn more about security engineering.
Provides a comprehensive overview of software security, covering topics such as software security principles, software security threats, and software security controls. It great resource for anyone who wants to learn more about software security.
Provides a comprehensive overview of network security, covering topics such as network security protocols, intrusion detection, and firewalls. It great resource for anyone who wants to learn more about network security.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Enterprise Perimeter and Network Security.
Designing Cisco Enterprise Networks: WAN for Enterprise...
Most relevant
Infrastructure and Network Security Architecture Planning...
Most relevant
Security Architecture and Engineering: Secure Design...
Palo Alto Networks Cybersecurity Foundation
Designing Cisco Enterprise Networks: Network Services
Best Practices: Roadmap to Enterprise Data Architecture...
Authoritative GCP
Security Architecture and Engineering: Security Controls...
Implementing Cisco SD-WAN Solutions v1.0 (300-415)
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser