We may earn an affiliate commission when you visit our partners.
Course image
Herbert J. Mattord, Ph.D., CISM, CISSP, CDP and Michael Whitman, Ph.D., CISM, CISSP

Almost every organization uses computer networks to share their information and to support their business operations. When we allow network access to data it is exposed to threats from inside and outside of the organization. This course examines the threats associated with using internal and external networks and how to manage the protection of information when it’s accessible via networks.

Read more

Almost every organization uses computer networks to share their information and to support their business operations. When we allow network access to data it is exposed to threats from inside and outside of the organization. This course examines the threats associated with using internal and external networks and how to manage the protection of information when it’s accessible via networks.

In this course, a learner will be able to:

● Describe the threats to data from information communication technology (ICT)

● Identify the issues and practices associated with managing network security

● Identify the practices, tools, and methodologies associated with assessing network security

● Describe the components of an effective network security program

Enroll now

What's inside

Syllabus

Welcome to the course Managing Network Security (Course 3)
This is an overview of the learning objectives for the course.
Introduction to Networking (Module 3.1)
Read more
Learning objectives for the module.
Cybersecurity Technology Administration (Module 3.2)
Learning objectives for the module on Cybersecurity Technology Administration
Wireless and Cloud Networks (Module 3.3)
Learning objectives for Wireless and Cloud Networks
Cybersecurity Network Auditing, Monitoring and Logging (Module 3.4)
Wrap up for Managing Network Security

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Teaches the audience to identify practices associated with managing network security
Taught by two instructors with significant credentials in information and cybersecurity
Examines threats to data from information communication technology (ICT)
Explores the practices, tools, and methodologies associated with assessing network security
Describes the components of an effective network security program
Meets the needs of those desiring to build a foundation in cybersecurity

Save this course

Save Managing Network Security to your list so you can find it easily later:
Save

Reviews summary

Highly rated network security course

Learners say this course on network security is engaging and well presented with lots of valuable information. According to students, the course covers major areas of network security without getting too complicated or too technical. Students say the videos are short and explanatory, and note that the course is especially helpful for those new to cybersecurity. Reviewers also mention that the course is up to date with the latest information and technology in network security.
Students recommend this informative course.
"I will recommend this course for all biginners."
"A very good course for Cyber Security Managers, CTOs, CISOs, Network and Infrastructure Mangers, IT Auditors and It Governanve / Compliance professionals."
"This was an excellent course."
Some learners report some errors in the quizzes.
"I believe there is problem at the final quiz since two of the questions does not accept the correct answers as correct."
"The problem with the course are the quizzes."
"They are a lot of wrong answers in there which affects your grade."

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Managing Network Security with these activities:
Review Principles of Networking
Brush up on the basics of networking, including network protocols, topologies, and network security principles.
Browse courses on Networking
Show steps
  • Review lecture notes or textbooks on networking concepts
  • Take practice quizzes or online assessments to test your understanding
  • Set up and configure a small network in a lab environment
  • Collaborate with peers or online forums to discuss networking topics
Compile a List of Network Security Tools
Gather and organize a comprehensive list of network security tools to assist in securing your networks.
Browse courses on Network Security Tools
Show steps
  • Research and identify different types of network security tools
  • Evaluate and compare the features and capabilities of each tool
  • Document the tools in a spreadsheet or database
Develop a Network Security Awareness Poster
Create a visual aid that promotes network security awareness and educates users about best practices for protecting their networks and data.
Browse courses on Security Awareness
Show steps
  • Identify key network security concepts and best practices
  • Design a visually appealing and informative poster
  • Distribute the poster in high-traffic areas within the organization
Five other activities
Expand to see all activities and additional details
Show all eight activities
Follow Tutorials on Network Security Monitoring
Enhance your understanding of network security monitoring techniques by following guided tutorials and practicing on virtual environments.
Show steps
  • Identify reputable sources for network security monitoring tutorials
  • Select tutorials that align with your skill level and interests
  • Follow the instructions and practice the techniques in a controlled environment
Conduct Network Security Audits
Practice conducting network security audits to identify vulnerabilities and improve the security of your networks.
Show steps
  • Gather information about the network and its security controls
  • Identify and document potential vulnerabilities
  • Evaluate the effectiveness of existing security controls
  • Recommend improvements to the network security posture
Implement a Network Security Plan
Develop and implement a comprehensive network security plan to protect your organization's data and systems from cyber threats.
Show steps
  • Identify the organization's security needs
  • Develop a security architecture and design
  • Implement the security plan and controls
  • Monitor and maintain the security infrastructure
Attend a Network Security Conference
Network with industry professionals, learn about the latest trends in network security, and attend workshops to enhance your skills.
Browse courses on network security
Show steps
  • Research and identify reputable network security conferences
  • Register for the conference and select relevant workshops
  • Attend the conference and actively participate in workshops
  • Follow up with speakers or vendors to continue learning and networking
Volunteer at a Cybersecurity Organization
Gain practical experience and contribute to the cybersecurity community by volunteering at organizations focused on protecting networks and data.
Browse courses on Cybersecurity
Show steps
  • Identify cybersecurity organizations in your area
  • Contact the organizations to inquire about volunteer opportunities
  • Attend volunteer training and orientation programs
  • Participate in activities such as security assessments, threat monitoring, or public outreach

Career center

Learners who complete Managing Network Security will develop knowledge and skills that may be useful to these careers:
Information Security Analyst
Information Security Analysts identify, analyze, and reduce risks in computer networks and systems. They also advise organizations on cybersecurity best practices and ensure compliance with regulatory requirements. The Managing Network Security course can be useful for aspiring Information Security Analysts as it provides a comprehensive overview of network security threats, risk assessment practices, and network security program components. By understanding these concepts, learners can gain a solid foundation for success in this field.
Network Security Engineer
Network Security Engineers design, implement, and maintain network security systems. They also monitor and respond to security incidents, and work to improve network security posture. The Managing Network Security course is a great fit for aspiring Network Security Engineers as it provides a deep dive into network security threats, risk assessment practices, and network security program components. By completing this course, learners can gain the skills and knowledge necessary to excel in this role.
Cybersecurity Consultant
Cybersecurity Consultants provide guidance and support to organizations on cybersecurity matters. They help organizations identify and mitigate cybersecurity risks, and develop and implement cybersecurity strategies. The Managing Network Security course can be a valuable resource for aspiring Cybersecurity Consultants as it provides a comprehensive overview of network security threats, risk assessment practices, and network security program components. By understanding these concepts, learners can gain the knowledge and skills necessary to succeed in this role.
Security Architect
Security Architects design and implement security measures to protect an organization's data and systems from cyber threats. They also work to ensure that security measures are aligned with business objectives. The Managing Network Security course can be useful for aspiring Security Architects as it provides a comprehensive overview of network security threats, risk assessment practices, and network security program components. By understanding these concepts, learners can gain a solid foundation for success in this field.
Cybersecurity Manager
Cybersecurity Managers oversee the development and implementation of cybersecurity programs within an organization. They also manage cybersecurity teams and budgets, and work to ensure that the organization is prepared to respond to cybersecurity incidents. The Managing Network Security course can be helpful for aspiring Cybersecurity Managers as it provides a comprehensive overview of network security threats, risk assessment practices, and network security program components. By understanding these concepts, learners can gain the skills and knowledge necessary to succeed in this role.
Cloud Security Engineer
Cloud Security Engineers design and implement security measures to protect cloud-based systems and data. They also work to ensure that cloud security measures are aligned with business objectives. The Managing Network Security course can be useful for aspiring Cloud Security Engineers as it provides a comprehensive overview of network security threats, risk assessment practices, and network security program components. By understanding these concepts, learners can gain a solid foundation for success in this field.
IT Auditor
IT Auditors evaluate the effectiveness of an organization's IT systems and controls. They also provide recommendations on how to improve IT security and compliance. The Managing Network Security course can be useful for aspiring IT Auditors as it provides a comprehensive overview of network security threats, risk assessment practices, and network security program components. By understanding these concepts, learners can gain a solid foundation for success in this field.
Network Administrator
Network Administrators manage and maintain computer networks. They also troubleshoot network problems and ensure that networks are operating securely and efficiently. The Managing Network Security course can be useful for aspiring Network Administrators as it provides a comprehensive overview of network security threats, risk assessment practices, and network security program components. By understanding these concepts, learners can gain a solid foundation for success in this field.
Security Analyst
Security Analysts monitor and analyze security events to identify and respond to threats. They also work to improve security posture by identifying and mitigating vulnerabilities. The Managing Network Security course can be useful for aspiring Security Analysts as it provides a comprehensive overview of network security threats, risk assessment practices, and network security program components. By understanding these concepts, learners can gain a solid foundation for success in this field.
Information Technology Specialist
Information Technology Specialists provide technical support to users of computer networks and systems. They also install and maintain hardware and software, and troubleshoot technical problems. The Managing Network Security course may be useful for aspiring Information Technology Specialists as it provides a comprehensive overview of network security threats, risk assessment practices, and network security program components. By understanding these concepts, learners can gain a solid foundation for success in this field.
Information Security Manager
Information Security Managers oversee the development and implementation of cybersecurity programs within an organization. They also manage cybersecurity teams and budgets, and work to ensure that the organization is prepared to respond to cybersecurity incidents. The Managing Network Security course may be useful for aspiring Information Security Managers as it provides a comprehensive overview of network security threats, risk assessment practices, and network security program components. By understanding these concepts, learners can gain a solid foundation for success in this field.
Database Administrator
Database Administrators manage and maintain databases. They also work to ensure that databases are secure and reliable. The Managing Network Security course may be useful for aspiring Database Administrators as it provides a comprehensive overview of network security threats, risk assessment practices, and network security program components. By understanding these concepts, learners can gain a solid foundation for success in this field.
IT Project Manager
IT Project Managers plan, execute, and manage IT projects. They also work to ensure that IT projects are completed on time, within budget, and to the required specifications. The Managing Network Security course may be useful for aspiring IT Project Managers as it provides a comprehensive overview of network security threats, risk assessment practices, and network security program components. By understanding these concepts, learners can gain a solid foundation for success in this field.
IT Security Specialist
IT Security Specialists implement and manage security measures to protect an organization's data and systems from cyber threats. They also work to ensure that security measures are aligned with business objectives. The Managing Network Security course may be useful for aspiring IT Security Specialists as it provides a comprehensive overview of network security threats, risk assessment practices, and network security program components. By understanding these concepts, learners can gain a solid foundation for success in this field.
Computer Systems Analyst
Computer Systems Analysts design, implement, and maintain computer systems. They also work to improve the efficiency and security of computer systems. The Managing Network Security course may be useful for aspiring Computer Systems Analysts as it provides a comprehensive overview of network security threats, risk assessment practices, and network security program components. By understanding these concepts, learners can gain a solid foundation for success in this field.

Reading list

We've selected 11 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Managing Network Security.
Provides a comprehensive overview of cryptography and network security. It valuable reference for students and professionals alike.
Covers the fundamental principles and practices of computer security. It classic textbook used in many academic institutions and is highly recommended for students and professionals alike.
Provides a step-by-step guide to conducting network security assessments. It is essential reading for security professionals who want to improve their network security posture.
Provides a comprehensive overview of network forensics techniques. It is essential reading for security professionals who need to investigate and respond to network security incidents.
Provides a comprehensive overview of network security protocols, technologies, and management. It valuable reference for students and professionals alike.
Provides a comprehensive overview of firewalls and network security. It valuable reference for network engineers and security professionals.
Offers a comprehensive view of network security vulnerabilities and how to exploit them. It useful resource for ethical hackers and security researchers.
Provides a comprehensive overview of network security concepts, threats, and countermeasures. It is suitable for beginners who need to build a solid foundation in network security.
Provides a comprehensive overview of computer networking concepts and technologies. It is recommended reading for students and professionals who want to build a strong foundation in networking.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Managing Network Security.
Home Networking Basics
Most relevant
Basic Network and Database Security
Most relevant
Digital Shield: Cybersecurity for Data and System...
Most relevant
Palo Alto Networks Cybersecurity Foundation
Most relevant
Networks and Communications Security
Most relevant
Network Security Basics
Most relevant
Network Security
Most relevant
Introduction to Automotive Cybersecurity & Vehicle...
Most relevant
Communication and Network Security for CISSP®
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser