We may earn an affiliate commission when you visit our partners.
Course image
Kevin Matthews, Christo Panchev, Dominique D, John Filippas, Fadzayi Guri, Antal Goldschmidt, Natasha Macmanard, Martyn Clayden, Ana Karnesova, Parminder Kaur, Matt Compton, and Melissa B.

Topics Covered

  • The basic principles of network security and cyber attacks
  • Real-world security case studies
  • Protecting assets
  • Intrusion detection systems
  • Assessing security threats from a practical and theoretical viewpoint

Save this course

Save Basics of Network Security to your list so you can find it easily later:
Save

Reviews summary

Basic network security: not worthwhile

With only a sole negative review, it is difficult to endorse this course as one that students should sign up for. The sole review complains that the course fails to live up to expectations that it might help the learner set up a VPN. Note that our confidence in this review is very low, and so you may wish to read the review yourself before deciding what to do.
The course did not meet the minimum expectations of at least one learner.
"This promised to be quick (2 weeks) introduction to networking - I really just want to learn enough to be able to set up my own VPNs (for use in China, where the Great F Wall is a Great PIA)."

Activities

Coming soon We're preparing activities for Basics of Network Security. These are activities you can do either before, during, or after a course.

Career center

Learners who complete Basics of Network Security will develop knowledge and skills that may be useful to these careers:

Reading list

We haven't picked any books for this reading list yet.
Provides a broad overview of computer networking, including a chapter on network security. It good resource for anyone who wants to understand the basics of network security.
Provides a comprehensive overview of cryptography and network security. It good resource for anyone who wants to learn more about these topics.
Provides a practical guide to using OpenSSL for network security. It good resource for anyone who wants to learn how to use OpenSSL to secure their networks.
Provides a practical guide to network security assessment. It good resource for anyone who wants to learn how to assess the security of their networks.
Provides a practical guide to network security. It good resource for anyone who wants to learn how to protect their networks from hackers.
Provides a practical guide to web application security. It good resource for anyone who wants to learn how to find and exploit security flaws in web applications.
Provides a comprehensive overview of cloud security. It good resource for anyone who wants to learn more about cloud security and how to protect their cloud-based applications and data.
Provides a comprehensive overview of network security. It good resource for anyone who wants to learn more about network security and how to protect their networks.
Provides a comprehensive overview of cybersecurity and cyberwarfare, covering topics such as the history of cyberattacks, the motivations of attackers, and the methods used to defend against cyber threats. It is an excellent resource for anyone who wants to learn more about this important topic.
Explores the psychology of social engineering attacks, which are often used to gain access to sensitive information or systems. It provides insights into how attackers manipulate human behavior and offers tips on how to protect against these attacks.
Introduces the fundamentals of malware analysis, including topics such as static and dynamic analysis, and reverse engineering. It practical guide that is suitable for both beginners and experienced malware analysts.
Provides a comprehensive overview of computer security, covering topics such as cryptography, access control, and intrusion detection. It classic textbook that is suitable for both undergraduate and graduate students.
Provides a practical guide to web application security testing. It covers a wide range of topics, including SQL injection, cross-site scripting, and parameter tampering, making it a valuable resource for web developers and security professionals.
Classic account of a real-world cyberattack. It tells the story of how Clifford Stoll, a system administrator at Lawrence Berkeley National Laboratory, tracked down a hacker who was stealing sensitive information from the lab's computers.
Provides a comprehensive overview of network security. It good resource for anyone who wants to learn more about network security and how to protect their networks.

Share

Help others find this course page by sharing it with your friends and followers:
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser