We may earn an affiliate commission when you visit our partners.
Course image
Cisco Learning & Certifications

If you are an associate-level cybersecurity analyst who is working in security operation centers, this course will provide introduction to network infrastructure and network security monitoring tools. By the end of the course, you will be able to:

•Describe ACL operation when using the established option • Describe the purpose of Access List Control lists

•Describe network address translation (NAT) fundamental concepts • Explain the NSM tools that are available to the network security analyst

Read more

If you are an associate-level cybersecurity analyst who is working in security operation centers, this course will provide introduction to network infrastructure and network security monitoring tools. By the end of the course, you will be able to:

•Describe ACL operation when using the established option • Describe the purpose of Access List Control lists

•Describe network address translation (NAT) fundamental concepts • Explain the NSM tools that are available to the network security analyst

• Describe the three types of NSM tools used within the SOC (commercial, Open Source, or homegrown) • Describe network-based malware protection • Describe the benefits of load balancing and web application firewalls.

• Describe AAA

• Describe basic models for implementing access controls over network resources.

To be successful in this course, you should have the following background:

1. Skills and knowledge equivalent to those learned in Implementing and Administering Cisco Solutions (CCNA) v1.0 course

2. Familiarity with Ethernet and TCP/IP networking

3. Working knowledge of the Windows and Linux operating systems

4. Familiarity with basics of networking security concepts.

Enroll now

What's inside

Syllabus

Understanding Network Infrastructure and Network Security Monitoring Tools
If you are an associate-level cybersecurity analyst who is working in security operation centers, this course will provide introduction to network infrastructure and network security monitoring tools. By the end of the course, you will be able to: •Describe ACL operation when using the established option • Describe the purpose of Access List Control lists •Describe network address translation (NAT) fundamental concepts • Explain the NSM tools that are available to the network security analyst• Describe the three types of NSM tools used within the SOC (commercial, Open Source, or homegrown) • Describe network-based malware protection • Describe the benefits of load balancing and web application firewalls. • Describe AAA • Describe basic models for implementing access controls over network resources. To be successful in this course, you should have the following background: 1. Skills and knowledge equivalent to those learned in Implementing and Administering Cisco Solutions (CCNA) v1.0 course 2. Familiarity with Ethernet and TCP/IP networking 3. Working knowledge of the Windows and Linux operating systems 4. Familiarity with basics of networking security concepts.
Read more
Understanding Common TCP/IP Attacks
If you are an associate-level cybersecurity analyst who is working in security operation centers, this course will help you examine attacks that happen around the TCP/IP protocol suite. By the end of the course, you will be able to: • Explain how ARP provides the essential service of mapping IP addresses to physical addresses on a network • Describe legacy TCP/IP vulnerabilities • Describe vulnerabilities related to the IP protocol • Describe vulnerabilities related to the ICMP protocol • Describe vulnerabilities related to the TCP protocol• Describe vulnerabilities related to the UDP protocol • Describe the attack surface and its relation to an organization's vulnerability • Describe how network data is collected through a reconnaissance attack • Describe how an access attack is used to gain unauthorized access • Describe MITM attacks • Describe how DoS and DDoS attacks are used against networks• Describe how a reflection attack is used against IP hosts • Describe the concepts and use of spoofing attacks• Describe the concepts and use of DHCP attacks • Demonstrate several attacks against the TCP/IP protocol suite• Describe security flaws in the TCP/IP protocol and how they can be used to attack networks and host. To be successful in this course, you should have the following background: 1. Skills and knowledge equivalent to those learned in Implementing and Administering Cisco Solutions (CCNA) v1.0 course 2. Familiarity with Ethernet and TCP/IP networking 3. Working knowledge of the Windows and Linux operating systems 4. Familiarity with basics of networking security concepts.

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Introduces network infrastructure, security monitoring tools, and Access Control Lists
Develops understanding around common TCP/IP attacks
Assumes learners have some networking and cybersecurity knowledge
Does not assume any experience in security operation centers

Save this course

Save Network Security to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Network Security with these activities:
Review basic networking concepts (TCP/IP, Ethernet)
Revisit foundational networking concepts to strengthen your understanding and prepare for the course materials.
Browse courses on Networking Fundamentals
Show steps
  • Review online tutorials or textbooks on basic networking concepts.
  • Practice configuring and troubleshooting basic network devices.
Review Network Security Fundamentals
Familiarize yourself with the basics of network security, which will provide a foundation for understanding the course materials.
Show steps
  • Read chapters 1-4 of the book.
  • Summarize the key concepts and definitions related to network security.
  • Identify different types of network security threats and attacks.
Join a study group with other students
Engage in discussions and knowledge exchange with peers, which can reinforce understanding and provide different perspectives on course topics.
Browse courses on Collaborative Learning
Show steps
  • Reach out to classmates or online forums to find potential study partners.
  • Establish regular meeting times and set a study agenda.
  • Discuss course materials, share insights, and work together on assignments.
Four other activities
Expand to see all activities and additional details
Show all seven activities
Complete online tutorials on network monitoring tools
Develop practical skills in using network monitoring tools, which will enhance your ability to analyze and detect network security issues.
Browse courses on Network Monitoring
Show steps
  • Identify recommended online tutorials on network monitoring tools.
  • Follow the tutorials and complete the exercises provided.
  • Practice using the tools in a simulated network environment.
Perform hands-on exercises in network security analysis
Gain practical experience in identifying and analyzing network security threats, enhancing your ability to detect and respond to security incidents.
Browse courses on Network Security Analysis
Show steps
  • Obtain access to a network security analysis tool, such as Wireshark or tcpdump.
  • Capture network traffic and perform analysis using the tool.
  • Identify and classify different types of network attacks and vulnerabilities.
Develop a network security monitoring plan
Apply your knowledge to create a comprehensive plan for monitoring and securing a network, demonstrating your understanding of the course concepts.
Show steps
  • Define the scope and objectives of the security monitoring plan.
  • Identify the tools and techniques to be used for monitoring.
  • Develop procedures for incident detection, response, and reporting.
Contribute to an open-source project related to network security
Engage with the network security community by contributing to open-source projects, enhancing your understanding and practical skills.
Browse courses on Open Source Security
Show steps
  • Identify an open-source project related to network security that you are interested in.
  • Review the project's codebase and documentation.
  • Make meaningful contributions to the project, such as fixing bugs or adding features.

Career center

Learners who complete Network Security will develop knowledge and skills that may be useful to these careers:
Network Security Analyst
Network Security Analyst is a professional who protects the computer networks of an organization from unauthorized access, use, disclosure, disruption, modification, or destruction. This course can help build a foundation for success in this role by providing an introduction to network infrastructure and security monitoring tools.
Security Operations Center Analyst
Security Operations Center Analysts monitor and analyze security events and incidents. This course can help build a foundation for success in this role by providing an introduction to network security monitoring tools and common TCP/IP attacks.
Cybersecurity Architect
Cybersecurity Architects design and implement security solutions to protect an organization's computer networks and systems. This course can help build a foundation for success in this role by providing an introduction to network infrastructure and security monitoring tools.
Security Architect
Security Architects design and implement security solutions to protect an organization's computer networks and systems. This course can help build a foundation for success in this role by providing an introduction to network infrastructure and security monitoring tools.
Information Security Analyst
Information Security Analysts identify and assess security risks to an organization's computer networks and systems. This course can be useful for Information Security Analysts by providing an introduction to network security monitoring tools and common TCP/IP attacks.
Penetration Tester
Penetration Testers are responsible for evaluating the security of computer systems by simulating attacks to identify vulnerabilities. This course can be useful for Penetration Testers by providing an introduction to network security monitoring tools and common TCP/IP attacks.
IT Auditor
IT Auditors evaluate the security of an organization's computer networks and systems. This course can be useful for IT Auditors by providing an introduction to network security monitoring tools and common TCP/IP attacks.
Network Administrator
Network Administrators are responsible for managing and maintaining an organization's computer networks. This course can be useful for Network Administrators by providing an introduction to network infrastructure and security monitoring tools.
Security Consultant
Security Consultants provide advice and guidance to organizations on how to improve their security posture. This course may be helpful for Security Consultants by providing an introduction to network security monitoring tools and common TCP/IP attacks.
Incident Responder
Incident Responders are responsible for responding to security incidents and breaches. This course can be useful for Incident Responders by providing an introduction to network security monitoring tools and common TCP/IP attacks.
Security Engineer
Security Engineers design, implement, and maintain security measures to protect an organization's computer networks and systems. This course may be helpful for Security Engineers by providing an introduction to network security monitoring tools and common TCP/IP attacks.
Information Security Manager
Information Security Managers are responsible for developing and implementing an organization's security policies and procedures. This course may be helpful for Information Security Managers by providing an introduction to network security monitoring tools and common TCP/IP attacks.
Risk Analyst
Risk Analysts identify and assess risks to an organization's computer networks and systems. This course may be helpful for Risk Analysts by providing an introduction to network security monitoring tools and common TCP/IP attacks.
Cloud Security Engineer
Cloud Security Engineers are responsible for securing cloud-based applications and infrastructure. This course may be helpful for Cloud Security Engineers by providing an introduction to network security monitoring tools and common TCP/IP attacks.
DevSecOps Engineer
DevSecOps Engineers integrate security into the software development lifecycle. This course may be helpful for DevSecOps Engineers by providing an introduction to network infrastructure and security monitoring tools.

Reading list

We've selected 18 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Network Security.
Offers a comprehensive coverage of cryptography and network security, including topics such as encryption, authentication, key management, and protocols. It valuable reference for understanding the cryptographic principles underlying network security technologies.
This classic book provides an in-depth exploration of the TCP/IP protocol suite, offering technical details and analysis. It valuable resource for understanding the fundamental concepts of networking and TCP/IP, which are essential for the course.
This textbook covers the fundamental principles of computer networking, including network protocols, architectures, and applications. It provides a solid foundation for understanding network security concepts and technologies.
Focuses on practical aspects of network security monitoring, providing guidance on how to detect, analyze, and respond to security incidents. It complements the course by offering hands-on experience with NSM tools and techniques.
This textbook provides a comprehensive treatment of security in computing systems, covering topics such as cryptography, authentication, access control, and disaster recovery. It offers a strong theoretical foundation for understanding the principles of network security.
Covers the essential concepts of network security, including protocols, applications, and standards. It offers a clear and concise overview of the fundamental principles and technologies used in network security.
This practical guide to TCP/IP network administration covers everything from basic concepts to advanced troubleshooting. It is an essential resource for anyone who works with networks.
This comprehensive textbook covers all aspects of computer networks, from the physical layer to the application layer. It valuable reference for anyone who wants to gain a deep understanding of how networks work.
Provides a step-by-step guide to network security, covering topics such as firewalls, intrusion detection, and cryptography. It valuable resource for anyone who wants to learn more about the nuts and bolts of network security.
Combines network security concepts with ethical hacking techniques. It provides a comprehensive overview of security vulnerabilities and countermeasures, enabling readers to understand both defensive and offensive security approaches.
Provides a comprehensive guide to network security assessment, covering topics such as vulnerability scanning, penetration testing, and incident response. It valuable resource for anyone who wants to learn more about how to assess and improve the security of their networks.
This textbook provides a comprehensive, up-to-date overview of network security, covering topics such as firewalls, intrusion detection, and cryptography. It valuable resource for anyone who wants to learn more about the field.
This textbook provides a concise overview of network security, covering topics such as cryptography, authentication, and access control. It good starting point for anyone who wants to learn more about the basics of network security.
Provides a practical guide to ethical hacking and penetration testing, covering topics such as reconnaissance, exploitation, and reporting. It great resource for anyone who wants to learn more about the tools and techniques used by hackers.
This textbook provides a comprehensive overview of network security, covering topics such as firewalls, intrusion detection, and cryptography. It good resource for anyone who wants to learn more about the practical aspects of network security.
Provides a historical perspective on the development of computer networks and the emergence of cybersecurity threats. It offers insights into the motivations and techniques of hackers and the evolution of security measures.
Provides a gentle introduction to network security, covering topics such as firewalls, antivirus software, and encryption. It good starting point for anyone who is new to network security.

Share

Help others find this course page by sharing it with your friends and followers:
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser