We may earn an affiliate commission when you visit our partners.
Course image
Google Career Certificates

Voici le troisième cours de la Certification en cybersécurité de Google. Ces cours vous permettront d'acquérir les compétences dont vous avez besoin pour postuler à un emploi de niveau débutant dans le domaine de la cybersécurité. Vous vous appuierez sur votre compréhension des sujets qui ont été introduits dans le deuxième cours de la Certification en cybersécurité de Google.

Read more

Voici le troisième cours de la Certification en cybersécurité de Google. Ces cours vous permettront d'acquérir les compétences dont vous avez besoin pour postuler à un emploi de niveau débutant dans le domaine de la cybersécurité. Vous vous appuierez sur votre compréhension des sujets qui ont été introduits dans le deuxième cours de la Certification en cybersécurité de Google.

Dans ce cours, vous découvrirez comment les réseaux permettent de connecter plusieurs appareils, leur permettant ainsi communiquer. Nous commencerons par présenter les principes fondamentaux des opérations et des protocoles réseau actuels. Par exemple, vous découvrirez la suite des protocoles Internet (TCP/IP - Transmission Control Protocol/Internet Protocol) et comment le matériel réseau, tels que les routeurs et les modems, permet à votre ordinateur d'envoyer et de recevoir des informations sur Internet. Ensuite, vous en apprendrez plus sur la sécurité réseau. Les entreprises stockent et envoient régulièrement des informations importantes sur leurs réseaux ; les réseaux sont donc des cibles courantes de cyberattaques. À la fin de ce cours, vous serez en mesure d'identifier les vulnérabilités au niveau des réseaux et d'expliquer comment sécuriser un réseau à l'aide de pare-feu, de renforcement du système et de réseaux privés virtuels.

Les employés de Google qui travaillent actuellement dans le domaine de la cybersécurité vous guideront à travers des vidéos, des activités pratiques et des exemples qui simulent des tâches courantes de cybersécurité, et vous aideront à développer vos compétences pour vous préparer à l'emploi.

Les participants qui termineront cette certification seront aptes à postuler à des emplois de niveau débutant dans le domaine de la cybersécurité. Aucune expérience préalable n'est nécessaire.

Enroll now

What's inside

Syllabus

Architecture réseau
Suivez une présentation de la sécurité réseau qui vous explique la manière dont cette dernière est liée aux menaces et vulnérabilités actuelles. Vous découvrirez ce que sont l'architecture réseau et les mécanismes de sécurisation d'un réseau.
Read more
Opérations réseau
Vous allez découvrir les protocoles réseau et comment la communication réseau peut introduire des vulnérabilités. De plus, vous en apprendrez davantage sur les mesures de sécurité les plus courantes, telles que les pare-feux, qui permettent aux réseaux de rester sûrs et fiables.
Se protéger contre les intrusions réseau
Découvrez les différents types d'attaques réseau et les techniques utilisées pour protéger les systèmes et dispositifs réseau compromis. Explorez les nombreuses façons dont les acteurs malveillants exploitent les vulnérabilités de l'infrastructure réseau et comment les professionnels de la cybersécurité identifient et éliminent les vulnérabilités potentielles.
Renforcement de la sécurité
Vous allez vous familiariser avec les pratiques de renforcement qui renforcent les systèmes de réseau. Vous apprendrez comment le renforcement de la sécurité permet d'établir des défenses contre les acteurs malveillants et les différentes méthodes d'intrusion. Vous apprendrez également à utiliser le renforcement de la sécurité pour relever les défis de sécurité uniques que posent les infrastructures cloud.

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Relies on TCP/IP and common networking protocols, which are employed across many industries
Provides a solid introduction to network security, emphasizing vulnerabilities and threats
Introduces various types of network attacks, highlighting techniques to mitigate them
Covers security hardening to address network infrastructure vulnerabilities
Explores cloud security challenges and the role of hardening in addressing them
Taught by Google employees working in cybersecurity, ensuring industry-relevant content and expertise

Save this course

Save Connecter et protéger : réseaux et sécurité des réseaux to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Connecter et protéger : réseaux et sécurité des réseaux with these activities:
Review foundational knowledge
Review foundational knowledge of network infrastructure, protocols, and security principles to prepare for the course.
Browse courses on Networking Basics
Show steps
  • Revisit basic concepts of networking and network architecture.
  • Refresh your understanding of Transmission Control Protocol/Internet Protocol (TCP/IP) and its role in network communication.
  • Review the fundamentals of routing and how it enables communication between networks.
Network diagram
Create a visual representation of a network to reinforce understanding of network structure.
Browse courses on Network Architecture
Show steps
  • Identify the different components of a network.
  • Draw a diagram of a simple network topology.
  • Explain the connections and relationships between network devices.
Participer à des groupes d'étude avec d'autres étudiants
Permet de discuter des concepts de sécurité réseau avec d'autres étudiants, ce qui peut améliorer la compréhension et la rétention.
Show steps
  • Rejoindre ou créer un groupe d'étude
  • Discuter des concepts de sécurité réseau avec d'autres membres du groupe
  • Travailler ensemble sur des exercices et des projets
Six other activities
Expand to see all activities and additional details
Show all nine activities
Explore network security best practices
Enhance your understanding of network security measures by following guided tutorials on firewall configuration, packet analysis, and intrusion detection.
Browse courses on network security
Show steps
  • Follow tutorials on configuring firewalls to protect networks from unauthorized access.
  • Explore tutorials on packet analysis techniques to identify potential security threats.
  • Engage with tutorials on intrusion detection systems to monitor networks for suspicious activity.
Network configuration drills
Practice configuring networks to solidify understanding of network protocols and operations.
Browse courses on Network Configuration
Show steps
  • Follow a tutorial on basic network configuration.
  • Set up a virtual network using a cloud computing platform.
  • Configure different network parameters including IP addresses, subnets, and routing.
  • Test network connectivity and troubleshoot any issues.
Pratiquer les protocoles réseau avec des simulations
Permet d'acquérir une expérience pratique de l'utilisation des protocoles réseau, ce qui est essentiel pour les professionnels de la cybersécurité.
Browse courses on TCP/IP
Show steps
  • Utiliser un simulateur de réseau pour configurer et tester des réseaux
  • Envoyer des paquets réseau à l'aide des protocoles TCP et UDP
  • Analyser les traces réseau pour identifier les problèmes de réseau
Network security tutorial
Explore network security concepts and implementation techniques through guided tutorials.
Browse courses on network security
Show steps
  • Identify the different types of network security threats.
  • Learn about firewalls, intrusion detection systems, and other network security tools.
  • Configure security measures on a network device.
Practice network troubleshooting
Sharpen your problem-solving skills by practicing network troubleshooting through interactive simulations or exercises.
Browse courses on Network Troubleshooting
Show steps
  • Participate in simulated network troubleshooting exercises to identify and resolve common issues.
  • Analyze network error logs to identify potential causes of network problems.
  • Practice using diagnostic tools to gather information about network performance and identify areas for improvement.
Build a small network
Gain hands-on experience by setting up a small network, configuring its components, and implementing basic security measures.
Show steps
  • Design a simple network topology with multiple devices and connections.
  • Configure network devices, such as routers and switches, to enable communication between devices.
  • Install and configure a firewall to protect the network from unauthorized access.
  • Test the network functionality and troubleshoot any issues that may arise.

Career center

Learners who complete Connecter et protéger : réseaux et sécurité des réseaux will develop knowledge and skills that may be useful to these careers:
Network Security Engineer
A Network Security Engineer designs, implements, and maintains security measures to protect an organization's computer networks from unauthorized access, use, disclosure, disruption, modification or destruction. This course's instruction in network protocols, security vulnerabilities, and countermeasures would be an asset. The study of network architecture and common network vulnerabilities will help the Network Security Engineer move into more challenging roles.
Cloud Security Engineer
A Cloud Security Engineer designs and implements security measures to protect an organization's cloud computing infrastructure. The focus on network security and protection in this course will be useful for a Cloud Security Engineer. The course will provide a comprehensive overview of network security concepts and best practices. Furthermore, the course will teach students how to identify and mitigate network security threats and vulnerabilities. Moreover, this course covers reinforcement of security measures, an essential topic for securing cloud infrastructure.
Security Engineer
A Security Engineer designs, implements, and maintains security measures to protect an organization's computer systems and networks from unauthorized access, use, disclosure, disruption, modification or destruction. The focus on network security and protection in this course will be useful for a Security Engineer. The course will provide a comprehensive overview of network security concepts and best practices. Furthermore, the course will teach students how to identify and mitigate network security threats and vulnerabilities.
Security Analyst
A Security Analyst monitors and analyzes an organization's security systems and data to identify and mitigate threats. The focus on network security and protection in this course will be useful for a Security Analyst. The course will provide a comprehensive overview of network security concepts and best practices. Furthermore, the course will teach students how to identify and mitigate network security threats and vulnerabilities.
Cybersecurity Analyst
A Cybersecurity Analyst is responsible for protecting an organization's computer systems and networks from unauthorized access, use, disclosure, disruption, modification or destruction. The focus on network security and protection in this course will be useful for a Cybersecurity Analyst. The course will provide a comprehensive overview of network security concepts and best practices. Furthermore, the course will teach students how to identify and mitigate network security threats and vulnerabilities.
Vulnerability Assessor
A Vulnerability Assessor identifies and assesses vulnerabilities in an organization's computer systems and networks. The focus on network security and protection in this course will be useful for a Vulnerability Assessor. The course will provide a comprehensive overview of network security concepts and best practices. Furthermore, the course will teach students how to identify and mitigate network security threats and vulnerabilities.
Information Security Analyst
An Information Security Analyst is responsible for protecting an organization's computer systems and networks from unauthorized access, use, disclosure, disruption, modification or destruction. The focus on network security and protection in this course will be useful for an Information Security Analyst. The course will provide a comprehensive overview of network security concepts and best practices. Furthermore, the course will teach students how to identify and mitigate network security threats and vulnerabilities.
Security Consultant
A Security Consultant helps organizations to protect their computer systems and networks from unauthorized access, use, disclosure, disruption, modification or destruction. The focus on network security and protection in this course will be useful for a Security Consultant. The course will provide a comprehensive overview of network security concepts and best practices. Furthermore, the course will teach students how to identify and mitigate network security threats and vulnerabilities.
Penetration Tester
A Penetration Tester attempts to gain unauthorized access to an organization's computer systems and networks in order to identify vulnerabilities. The focus on network security and protection in this course will be useful for a Penetration Tester. The course will provide a comprehensive overview of network security concepts and best practices. Furthermore, the course will teach students how to identify and mitigate network security threats and vulnerabilities.
IT Security Manager
An IT Security Manager is responsible for developing and implementing an organization's information security policies and procedures. The focus on network security and protection in this course will be useful for an IT Security Manager. The course will provide a comprehensive overview of network security concepts and best practices. Furthermore, the course will teach students how to identify and mitigate network security threats and vulnerabilities.
Cybersecurity Architect
A Cybersecurity Architect designs and implements security measures to protect an organization's computer systems and networks from unauthorized access, use, disclosure, disruption, modification or destruction. The focus on network security and protection in this course will be useful for a Cybersecurity Architect. The course will provide a comprehensive overview of network security concepts and best practices. Furthermore, the course will teach students how to identify and mitigate network security threats and vulnerabilities.
Network Architect
A Network Architect designs and implements an organization's computer networks. This course's instruction in network fundamentals, protocols, and security measures would be an asset. The study of network architecture and common network vulnerabilities will help the Network Architect build and maintain efficient and secure networks.
Network Engineer
A Network Engineer designs, builds, and maintains computer networks. This course's instruction in network fundamentals, protocols, and security measures would be an asset. The study of network architecture will help the Network Engineer to understand how to connect different devices and ensure that data can be effectively transmitted across them. Furthermore, this curriculum provides Network Engineers with foundational knowledge in network security. They will learn about common network vulnerabilities and how to protect against them. This course may be of particular use if pursuing a specialization in network security.
Network Administrator
A Network Administrator is responsible for managing and maintaining an organization's computer networks. This course's instruction in network fundamentals, protocols, and security measures would be an asset. Understanding network architecture and common network vulnerabilities will help them to keep networks running smoothly and securely.
IT Manager
An IT Manager is responsible for planning, implementing, and managing an organization's information technology systems. The focus on network security and protection in this course will be useful for an IT Manager. The course will provide a comprehensive overview of network security concepts and best practices. Furthermore, the course will teach students how to identify and mitigate network security threats and vulnerabilities.

Reading list

We've selected six books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Connecter et protéger : réseaux et sécurité des réseaux.
Ce livre approfondit les normes et les applications de sécurité des réseaux, fournissant une compréhension détaillée des technologies de sécurité.
Ce livre se concentre sur l'implémentation de la sécurité réseau à l'aide des produits Cisco, fournissant des instructions pratiques et des études de cas.
Ce livre couvre les techniques d'évaluation de la sécurité des réseaux, montrant comment identifier et atténuer les vulnérabilités.
Ce livre fournit une perspective pratique sur le piratage, expliquant les techniques et les outils utilisés par les pirates pour exploiter les vulnérabilités.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Connecter et protéger : réseaux et sécurité des réseaux.
Tirer la sonnette d'alarme : détection et réponse
Most relevant
Ressources numériques, menaces et vulnérabilités
Most relevant
Les outils du métier : Linux et SQL
Most relevant
Réseaux neuronaux et Deep Learning
Most relevant
Faire preuve de prudence : gestion des risques de sécurité
Most relevant
Automatiser les tâches de cybersécurité avec Python
Most relevant
Application : se préparer aux métiers de la cybersécurité
Most relevant
Fondamentaux de la cybersécurité
Most relevant
Introduction au Marketing des réseaux sociaux
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser