We may earn an affiliate commission when you visit our partners.
Course image
Google Career Certificates

This is the third course in the Google Cybersecurity Certificate. These courses will equip you with the skills you need to apply for an entry-level cybersecurity job. You’ll build on your understanding of the topics that were introduced in the second Google Cybersecurity Certificate course.

Read more

This is the third course in the Google Cybersecurity Certificate. These courses will equip you with the skills you need to apply for an entry-level cybersecurity job. You’ll build on your understanding of the topics that were introduced in the second Google Cybersecurity Certificate course.

In this course, you will explore how networks connect multiple devices and allow them to communicate. You'll start with the fundamentals of modern networking operations and protocols. For example, you'll learn about the Transmission Control Protocol / Internet Protocol (TCP/IP) model and how network hardware, like routers and modems, allow your computer to send and receive information on the internet. Then, you'll learn about network security. Organizations often store and send valuable information on their networks, so networks are common targets of cyber attacks. By the end of this course, you'll be able to recognize network-level vulnerabilities, and explain how to secure a network using firewalls, system hardening, and virtual private networks.

Google employees who currently work in cybersecurity will guide you through videos, provide hands-on activities and examples that simulate common cybersecurity tasks, and help you build your skills to prepare for jobs.

Learners who complete this certificate will be equipped to apply for entry-level cybersecurity roles. No previous experience is necessary.

By the end of this course, you will:

- Describe the structure of different computer networks.

- Illustrate how data is sent and received over a network.

- Recognize common network protocols.

- Identify common network security measures and protocols.

- Explain how to secure a network against intrusion tactics.

- Compare and contrast local networks to cloud computing.

- Explain the different types of system hardening techniques.

Enroll now

What's inside

Syllabus

Network architecture
You'll be introduced to network security and explain how it relates to ongoing security threats and vulnerabilities. You will learn about network architecture and mechanisms to secure a network.
Read more
Network operations
You will explore network protocols and how network communication can introduce vulnerabilities. In addition, you'll learn about common security measures, like firewalls, that help network operations remain safe and reliable.
Secure against network intrusions
You will understand types of network attacks and techniques used to secure compromised network systems and devices. You'll explore the many ways that malicious actors exploit vulnerabilities in network infrastructure and how cybersecurity professionals identify and close potential loopholes.
Security hardening
You will become familiar with network hardening practices that strengthen network systems. You'll learn how security hardening helps defend against malicious actors and intrusion methods. You'll also learn how to use security hardening to address the unique security challenges posed by cloud infrastructures.

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Builds a foundational understanding of network architecture, protocols, and the role of networks in cybersecurity
Explores common network attacks, their impacts, and techniques to secure networks against them
Introduces different security measures, such as firewalls and system hardening, and their importance in safeguarding networks
Emphasizes the role of network security in protecting valuable information and preventing cyber attacks
Suitable for individuals with no prior cybersecurity experience, making it accessible to beginners

Save this course

Save Connect and Protect: Networks and Network Security to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Connect and Protect: Networks and Network Security with these activities:
Review networking fundamentals
Refresh your understanding of basic networking concepts, such as network topologies, protocols, and network security
Browse courses on Networking Fundamentals
Show steps
  • Review notes or online resources on network fundamentals
  • Take practice quizzes or complete hands-on exercises on networking topics
Follow tutorials on network security
Explore different aspects of network security, such as common threats, vulnerabilities, and mitigation techniques
Browse courses on network security
Show steps
  • Identify reputable sources for network security tutorials
  • Select tutorials that cover specific areas of interest, such as firewalls or intrusion detection systems
  • Follow the tutorials step-by-step and take notes
Attend a workshop on network security
Attend a workshop led by experienced network security professionals to gain insights and practical skills
Show steps
  • Identify and register for a relevant network security workshop
  • Attend the workshop and actively participate in discussions and hands-on exercises
  • Take notes and follow up with the workshop organizers or speakers for additional resources
Five other activities
Expand to see all activities and additional details
Show all eight activities
Volunteer with a cybersecurity organization
Gain practical experience and contribute to the cybersecurity community by volunteering with an organization focused on network security
Browse courses on Community Involvement
Show steps
  • Identify and contact cybersecurity organizations in your area
  • Inquire about volunteer opportunities and express your interest and skills
  • Commit to a specific volunteer role and fulfill your responsibilities
Practice network troubleshooting
Gain hands-on experience in identifying and resolving common network issues
Browse courses on Network Troubleshooting
Show steps
  • Set up a virtual network environment for practice
  • Introduce common network problems, such as connectivity issues or security breaches
  • Troubleshoot the problems using network monitoring tools and diagnostic techniques
Write a blog post on network security best practices
Share your knowledge and understanding of network security by writing a blog post that outlines best practices for securing networks
Show steps
  • Research and gather information on network security best practices
  • Organize your findings and outline the key points for your blog post
  • Write the blog post in a clear and informative style
Develop a security plan for a small network
Apply your knowledge of network security to design a comprehensive security plan for a small network
Show steps
  • Identify the assets and critical systems within the network
  • Conduct a risk assessment to identify potential threats and vulnerabilities
  • Develop and document a security plan that outlines measures to mitigate the identified risks
Set up a home network with enhanced security features
Apply your skills to enhance the security of your home network by implementing additional security measures
Show steps
  • Assess your current home network setup and identify areas for improvement
  • Research and select appropriate security features, such as a firewall, intrusion detection system, or VPN
  • Configure and implement the security measures on your home network

Career center

Learners who complete Connect and Protect: Networks and Network Security will develop knowledge and skills that may be useful to these careers:
Network Security Analyst
A Network Security Analyst is responsible for identifying and mitigating security risks within computer networks. This course can help build a foundation for this career by providing an overview of network architecture, protocols, and security measures. Learners will also gain knowledge of common network attacks and techniques used to secure compromised systems and devices.
Information Security Analyst
An Information Security Analyst is responsible for protecting an organization's information assets from unauthorized access, use, disclosure, disruption, modification, or destruction. This course can help build a foundation for this career by providing an overview of network security, threats, and vulnerabilities. Learners will also gain knowledge of security measures and protocols, as well as techniques for detecting and responding to cyber attacks.
Cybersecurity Analyst
A Cybersecurity Analyst is responsible for protecting computer networks and systems from cyber attacks. This course can help build a foundation for this career by providing an overview of network security, threats, and vulnerabilities. Learners will also gain knowledge of security measures and protocols, as well as techniques for detecting and responding to cyber attacks.
Network Administrator
A Network Administrator is responsible for managing and maintaining computer networks. This course can help build a foundation for this career by providing an overview of network architecture, protocols, and security measures. Learners will also gain practical experience with network management tools and troubleshooting techniques.
IT Security Engineer
An IT Security Engineer is responsible for securing an organization's IT infrastructure. This course can help build a foundation for this career by providing an overview of network security, threats, and vulnerabilities. Learners will also gain knowledge of security measures and protocols, as well as techniques for detecting and responding to cyber attacks.
Cloud Security Engineer
A Cloud Security Engineer is responsible for securing cloud computing environments. This course can help build a foundation for this career by providing an overview of network security, threats, and vulnerabilities in cloud environments. Learners will also gain knowledge of security measures and protocols specific to cloud computing, as well as techniques for detecting and responding to cyber attacks in the cloud.
Security Architect
A Security Architect is responsible for designing and implementing security solutions for an organization. This course can help build a foundation for this career by providing an overview of network security, threats, and vulnerabilities. Learners will also gain knowledge of security measures and protocols, as well as techniques for detecting and responding to cyber attacks.
Web Developer
A Web Developer is responsible for designing, developing, and maintaining websites. This course may be useful for Web Developers who want to gain a better understanding of network security.
Data Scientist
A Data Scientist is responsible for collecting, analyzing, and interpreting data to help organizations make better decisions. This course may be useful for Data Scientists who want to gain a better understanding of network security.
Software Engineer
A Software Engineer is responsible for designing, developing, and maintaining software applications. This course may be useful for Software Engineers who want to gain a better understanding of network security.
Network Engineer
A Network Engineer is responsible for designing, implementing, and maintaining computer networks. This course can help build a foundation for this career by providing an overview of network architecture, protocols, and security measures. Learners will also gain practical experience with network design and implementation tools.
Systems Engineer
A Systems Engineer is responsible for designing, implementing, and maintaining computer systems. This course can help build a foundation for this career by providing an overview of network architecture, protocols, and security measures. Learners will also gain practical experience with systems design and implementation tools.
Security Consultant
A Security Consultant is responsible for providing security advice and guidance to organizations. This course may be useful for Security Consultants who want to gain a better understanding of network security.
Information Systems Manager
An Information Systems Manager is responsible for managing an organization's information systems. This course may be useful for Information Systems Managers who want to gain a better understanding of network security.
IT Manager
An IT Manager is responsible for managing an organization's IT infrastructure. This course may be useful for IT Managers who want to gain a better understanding of network security.

Reading list

We've selected 11 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Connect and Protect: Networks and Network Security.
Provides a comprehensive overview of network security concepts, including network threats, security measures, and security tools.
Provides a comprehensive overview of computer networking concepts, including network architecture, protocols, and security.
Provides a detailed overview of the TCP/IP protocol suite, which is the foundation of the internet.
Provides a comprehensive overview of cloud security concepts, including cloud security threats, security measures, and security tools.
Provides a comprehensive overview of firewalls and intrusion detection systems, which are essential for protecting networks from attack.
Provides a comprehensive overview of software security concepts, including software security threats, security measures, and security tools.
Provides a comprehensive overview of cryptography concepts, including cryptography algorithms, cryptography protocols, and cryptography applications.
Provides a step-by-step guide to network security assessment, which is essential for identifying and mitigating security risks.
Provides a comprehensive overview of computer security concepts, including network security, cryptography, and security management.
Provides a comprehensive overview of network security essentials, including network threats, security measures, and security standards.
Provides a comprehensive overview of advanced penetration testing techniques, which are used to assess the security of networks and systems.

Share

Help others find this course page by sharing it with your friends and followers:
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser