We may earn an affiliate commission when you visit our partners.
Course image
Coursera logo

Network Security

Cisco Learning & Certifications

If you are an associate-level cybersecurity analyst who is working in security operation centers, this course will provide introduction to network infrastructure and network security monitoring tools. By the end of the course, you will be able to:

Read more

If you are an associate-level cybersecurity analyst who is working in security operation centers, this course will provide introduction to network infrastructure and network security monitoring tools. By the end of the course, you will be able to:

•Describe ACL operation when using the established option • Describe the purpose of Access List Control lists

•Describe network address translation (NAT) fundamental concepts • Explain the NSM tools that are available to the network security analyst

• Describe the three types of NSM tools used within the SOC (commercial, Open Source, or homegrown) • Describe network-based malware protection • Describe the benefits of load balancing and web application firewalls.

• Describe AAA

• Describe basic models for implementing access controls over network resources.

To be successful in this course, you should have the following background:

1. Skills and knowledge equivalent to those learned in Implementing and Administering Cisco Solutions (CCNA) v1.0 course

2. Familiarity with Ethernet and TCP/IP networking

3. Working knowledge of the Windows and Linux operating systems

4. Familiarity with basics of networking security concepts.

Enroll now

What's inside

Syllabus

Understanding Network Infrastructure and Network Security Monitoring Tools
If you are an associate-level cybersecurity analyst who is working in security operation centers, this course will provide introduction to network infrastructure and network security monitoring tools. By the end of the course, you will be able to: •Describe ACL operation when using the established option • Describe the purpose of Access List Control lists •Describe network address translation (NAT) fundamental concepts • Explain the NSM tools that are available to the network security analyst• Describe the three types of NSM tools used within the SOC (commercial, Open Source, or homegrown) • Describe network-based malware protection • Describe the benefits of load balancing and web application firewalls. • Describe AAA • Describe basic models for implementing access controls over network resources. To be successful in this course, you should have the following background: 1. Skills and knowledge equivalent to those learned in Implementing and Administering Cisco Solutions (CCNA) v1.0 course 2. Familiarity with Ethernet and TCP/IP networking 3. Working knowledge of the Windows and Linux operating systems 4. Familiarity with basics of networking security concepts.
Read more
Understanding Common TCP/IP Attacks
If you are an associate-level cybersecurity analyst who is working in security operation centers, this course will help you examine attacks that happen around the TCP/IP protocol suite. By the end of the course, you will be able to: • Explain how ARP provides the essential service of mapping IP addresses to physical addresses on a network • Describe legacy TCP/IP vulnerabilities • Describe vulnerabilities related to the IP protocol • Describe vulnerabilities related to the ICMP protocol • Describe vulnerabilities related to the TCP protocol• Describe vulnerabilities related to the UDP protocol • Describe the attack surface and its relation to an organization's vulnerability • Describe how network data is collected through a reconnaissance attack • Describe how an access attack is used to gain unauthorized access • Describe MITM attacks • Describe how DoS and DDoS attacks are used against networks• Describe how a reflection attack is used against IP hosts • Describe the concepts and use of spoofing attacks• Describe the concepts and use of DHCP attacks • Demonstrate several attacks against the TCP/IP protocol suite• Describe security flaws in the TCP/IP protocol and how they can be used to attack networks and host. To be successful in this course, you should have the following background: 1. Skills and knowledge equivalent to those learned in Implementing and Administering Cisco Solutions (CCNA) v1.0 course 2. Familiarity with Ethernet and TCP/IP networking 3. Working knowledge of the Windows and Linux operating systems 4. Familiarity with basics of networking security concepts.

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Introduces network infrastructure, security monitoring tools, and Access Control Lists
Develops understanding around common TCP/IP attacks
Assumes learners have some networking and cybersecurity knowledge
Does not assume any experience in security operation centers

Save this course

Save Network Security to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for Network Security. These are activities you can do either before, during, or after a course.

Career center

Learners who complete Network Security will develop knowledge and skills that may be useful to these careers:
Network Security Analyst
Network Security Analyst is a professional who protects the computer networks of an organization from unauthorized access, use, disclosure, disruption, modification, or destruction. This course can help build a foundation for success in this role by providing an introduction to network infrastructure and security monitoring tools.
Security Operations Center Analyst
Security Operations Center Analysts monitor and analyze security events and incidents. This course can help build a foundation for success in this role by providing an introduction to network security monitoring tools and common TCP/IP attacks.
Cybersecurity Architect
Cybersecurity Architects design and implement security solutions to protect an organization's computer networks and systems. This course can help build a foundation for success in this role by providing an introduction to network infrastructure and security monitoring tools.
Security Architect
Security Architects design and implement security solutions to protect an organization's computer networks and systems. This course can help build a foundation for success in this role by providing an introduction to network infrastructure and security monitoring tools.
Information Security Analyst
Information Security Analysts identify and assess security risks to an organization's computer networks and systems. This course can be useful for Information Security Analysts by providing an introduction to network security monitoring tools and common TCP/IP attacks.
Penetration Tester
Penetration Testers are responsible for evaluating the security of computer systems by simulating attacks to identify vulnerabilities. This course can be useful for Penetration Testers by providing an introduction to network security monitoring tools and common TCP/IP attacks.
IT Auditor
IT Auditors evaluate the security of an organization's computer networks and systems. This course can be useful for IT Auditors by providing an introduction to network security monitoring tools and common TCP/IP attacks.
Network Administrator
Network Administrators are responsible for managing and maintaining an organization's computer networks. This course can be useful for Network Administrators by providing an introduction to network infrastructure and security monitoring tools.
Security Consultant
Security Consultants provide advice and guidance to organizations on how to improve their security posture. This course may be helpful for Security Consultants by providing an introduction to network security monitoring tools and common TCP/IP attacks.
Incident Responder
Incident Responders are responsible for responding to security incidents and breaches. This course can be useful for Incident Responders by providing an introduction to network security monitoring tools and common TCP/IP attacks.
Security Engineer
Security Engineers design, implement, and maintain security measures to protect an organization's computer networks and systems. This course may be helpful for Security Engineers by providing an introduction to network security monitoring tools and common TCP/IP attacks.
Information Security Manager
Information Security Managers are responsible for developing and implementing an organization's security policies and procedures. This course may be helpful for Information Security Managers by providing an introduction to network security monitoring tools and common TCP/IP attacks.
Risk Analyst
Risk Analysts identify and assess risks to an organization's computer networks and systems. This course may be helpful for Risk Analysts by providing an introduction to network security monitoring tools and common TCP/IP attacks.
Cloud Security Engineer
Cloud Security Engineers are responsible for securing cloud-based applications and infrastructure. This course may be helpful for Cloud Security Engineers by providing an introduction to network security monitoring tools and common TCP/IP attacks.
DevSecOps Engineer
DevSecOps Engineers integrate security into the software development lifecycle. This course may be helpful for DevSecOps Engineers by providing an introduction to network infrastructure and security monitoring tools.

Reading list

We've selected 18 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Network Security.
Offers a comprehensive coverage of cryptography and network security, including topics such as encryption, authentication, key management, and protocols. It valuable reference for understanding the cryptographic principles underlying network security technologies.
This classic book provides an in-depth exploration of the TCP/IP protocol suite, offering technical details and analysis. It valuable resource for understanding the fundamental concepts of networking and TCP/IP, which are essential for the course.
This textbook covers the fundamental principles of computer networking, including network protocols, architectures, and applications. It provides a solid foundation for understanding network security concepts and technologies.
Focuses on practical aspects of network security monitoring, providing guidance on how to detect, analyze, and respond to security incidents. It complements the course by offering hands-on experience with NSM tools and techniques.
This textbook provides a comprehensive treatment of security in computing systems, covering topics such as cryptography, authentication, access control, and disaster recovery. It offers a strong theoretical foundation for understanding the principles of network security.
Covers the essential concepts of network security, including protocols, applications, and standards. It offers a clear and concise overview of the fundamental principles and technologies used in network security.
This practical guide to TCP/IP network administration covers everything from basic concepts to advanced troubleshooting. It is an essential resource for anyone who works with networks.
This comprehensive textbook covers all aspects of computer networks, from the physical layer to the application layer. It valuable reference for anyone who wants to gain a deep understanding of how networks work.
Provides a step-by-step guide to network security, covering topics such as firewalls, intrusion detection, and cryptography. It valuable resource for anyone who wants to learn more about the nuts and bolts of network security.
Combines network security concepts with ethical hacking techniques. It provides a comprehensive overview of security vulnerabilities and countermeasures, enabling readers to understand both defensive and offensive security approaches.
Provides a comprehensive guide to network security assessment, covering topics such as vulnerability scanning, penetration testing, and incident response. It valuable resource for anyone who wants to learn more about how to assess and improve the security of their networks.
This textbook provides a comprehensive, up-to-date overview of network security, covering topics such as firewalls, intrusion detection, and cryptography. It valuable resource for anyone who wants to learn more about the field.
This textbook provides a concise overview of network security, covering topics such as cryptography, authentication, and access control. It good starting point for anyone who wants to learn more about the basics of network security.
Provides a practical guide to ethical hacking and penetration testing, covering topics such as reconnaissance, exploitation, and reporting. It great resource for anyone who wants to learn more about the tools and techniques used by hackers.
This textbook provides a comprehensive overview of network security, covering topics such as firewalls, intrusion detection, and cryptography. It good resource for anyone who wants to learn more about the practical aspects of network security.
Provides a historical perspective on the development of computer networks and the emergence of cybersecurity threats. It offers insights into the motivations and techniques of hackers and the evolution of security measures.
Provides a gentle introduction to network security, covering topics such as firewalls, antivirus software, and encryption. It good starting point for anyone who is new to network security.

Share

Help others find this course page by sharing it with your friends and followers:
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser