We may earn an affiliate commission when you visit our partners.
Course image
Wenke Lee and Catherine Gamboa

Take Udacity's free Network Security course for an introduction to computer and network security including cryptography, cryptanalysis and more. Learn online with Udacity.

Here's a deal for you

We found an offer that may be relevant to this course.
Save money when you learn. All coupon codes, vouchers, and discounts are applied automatically unless otherwise noted.

What's inside

Syllabus

Course Introduction
DDoS Attacks
Cybercrimes
Penetration Testing
Read more
Browser Security Models
Web Session Management
HTTPS
Security of Internet Protocols
Domain Name Systems Security
Advanced Malware Analysis
Mobile Malware
Cloud Computing: VM Monitoring
Property-Preserving Encryption - Oblivious RAM
Botnet Detection
Internet Scale Threat Analysis: Scanning
Domain and Network Reputation
Machine Learning for Security
Data Poisoning and Model Evasion
Basics of Blockchain and Bitcoin
New and Alternative Cryptocurrencies
Attack Tolerant Systems

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Taught by Wenke Lee and Catherine Gamboa, who are recognized for their work in cybersecurity
Covers fundamental concepts in computer and network security, including cryptography, cryptanalysis, and more
Provides a comprehensive understanding of network security, covering topics such as DDoS attacks, penetration testing, and web session management
Includes hands-on exercises and projects to help learners apply the concepts they learn

Save this course

Save GT - Network Security to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in GT - Network Security with these activities:
Understand HTTP and SSL/TLS Protocols
This book will provide an indepth review of the HTTP and SSL/TLS protocols, which are integral to understanding network security and subsequent lessons in this course.
Show steps
  • Read Chapters 1-5 of the book.
  • Summarize the key concepts of each chapter in your own words.
  • Identify real-world examples of how HTTP and SSL/TLS are used in practice.
Complete an Online Course on Cryptography
Taking an online course on cryptography will provide a deeper understanding of a fundamental component of network security.
Browse courses on Cryptography
Show steps
  • Choose an online course on cryptography.
  • Complete the course modules and assignments.
  • Apply the knowledge you have gained to real-world scenarios.
Participate in a Study Group
Participating in a study group will provide opportunities to discuss and reinforce course concepts with peers.
Browse courses on Collaboration
Show steps
  • Find a study group or form one with classmates.
  • Meet regularly to discuss course material and work on assignments together.
  • Quiz each other and provide feedback on each other's work.
Five other activities
Expand to see all activities and additional details
Show all eight activities
Configure and Test Network Security Controls
This activity will provide hands-on experience configuring and testing network security controls to reinforce learning.
Browse courses on network security
Show steps
  • Choose a network security control to implement.
  • Configure the security control according to best practices.
  • Test the security control to ensure it is functioning properly.
  • Document the results of your testing.
Attend a Network Security Workshop
Attending a network security workshop will provide an opportunity to learn from experts and participate in hands-on activities.
Browse courses on Cybersecurity
Show steps
  • Find a network security workshop that interests you.
  • Register for the workshop.
  • Attend the workshop and participate in the activities.
  • Follow up with the workshop organizers or attendees to continue the learning process.
Develop a Network Security Plan
Developing a network security plan will provide a practical application of the concepts learned in the course.
Show steps
  • Identify the scope of the network security plan.
  • Identify the threats and vulnerabilities that the plan will address.
  • Develop a set of security controls to mitigate the identified threats and vulnerabilities.
  • Create a plan for implementing and monitoring the security controls.
  • Document the network security plan.
Write a Blog Post on Security Vulnerabilities
Writing a blog post will help you synthesize and reinforce your understanding of security vulnerabilities.
Browse courses on Security Vulnerabilities
Show steps
  • Identify a specific security vulnerability.
  • Research the vulnerability and its potential impact.
  • Write a blog post that explains the vulnerability and provides recommendations for how to mitigate it.
Contribute to an Open Source Security Project
Contributing to an open source security project will provide practical experience in applying network security concepts.
Browse courses on Open Source
Show steps
  • Find an open source security project that interests you.
  • Identify an area where you can contribute to the project.
  • Submit a pull request with your contribution.
  • Review the feedback on your pull request and make changes as necessary.
  • Merge your pull request into the project.

Career center

Learners who complete GT - Network Security will develop knowledge and skills that may be useful to these careers:
Information Security Analyst
An Information Security Analyst protects an organization's computer systems and networks from unauthorized access, use, disclosure, disruption, modification, or destruction. They develop and implement security policies and procedures, and they monitor and investigate security incidents. This course can help you prepare for a career as an Information Security Analyst by providing you with a foundation in computer and network security. You will learn about cryptography, cryptanalysis, and other security concepts that are essential for protecting information systems.
Computer Network Architect
A Computer Network Architect designs, builds, and maintains computer networks. They ensure that networks are secure and efficient, and they troubleshoot and resolve network problems. This course can help you prepare for a career as a Computer Network Architect by providing you with a foundation in computer and network security. You will learn about cryptography, cryptanalysis, and other security concepts that are essential for designing and maintaining secure networks.
Security Engineer
A Security Engineer designs, implements, and maintains security systems for an organization. They work with other IT professionals to ensure that the organization's computer systems and networks are secure from unauthorized access, use, disclosure, disruption, modification, or destruction. This course can help you prepare for a career as a Security Engineer by providing you with a foundation in computer and network security. You will learn about cryptography, cryptanalysis, and other security concepts that are essential for designing and maintaining secure systems.
Network Security Specialist
A Network Security Specialist designs, implements, and maintains security measures for an organization's networks. They work with other security professionals to ensure that the organization's networks are secure from unauthorized access, use, disclosure, disruption, modification, or destruction. This course can help you prepare for a career as a Network Security Specialist by providing you with a foundation in computer and network security. You will learn about cryptography, cryptanalysis, and other security concepts that are essential for designing and maintaining secure networks.
Penetration Tester
A Penetration Tester simulates attacks on an organization's computer systems and networks to identify vulnerabilities that could be exploited by attackers. They provide recommendations for improving the organization's security posture. This course can help you prepare for a career as a Penetration Tester by providing you with a foundation in computer and network security. You will learn about cryptography, cryptanalysis, and other security concepts that are essential for conducting penetration tests.
Cryptographer
A Cryptographer designs and implements cryptographic algorithms and protocols to protect information from unauthorized access, use, disclosure, disruption, modification, or destruction. They work with other security professionals to develop and implement security measures to protect information systems. This course can help you prepare for a career as a Cryptographer by providing you with a foundation in computer and network security. You will learn about cryptography, cryptanalysis, and other security concepts that are essential for designing and implementing cryptographic algorithms and protocols.
Security Architect
A Security Architect designs and implements security architectures for organizations. They work with other security professionals to develop and implement security measures to protect the organization's information assets from unauthorized access, use, disclosure, disruption, modification, or destruction. This course can help you prepare for a career as a Security Architect by providing you with a foundation in computer and network security. You will learn about cryptography, cryptanalysis, and other security concepts that are essential for designing and implementing secure architectures.
Security Operations Analyst
A Security Operations Analyst monitors and analyzes security events to identify and respond to security threats. They work with other security professionals to investigate and resolve security incidents. This course can help you prepare for a career as a Security Operations Analyst by providing you with a foundation in computer and network security. You will learn about cryptography, cryptanalysis, and other security concepts that are essential for understanding and responding to security threats.
Malware Analyst
A Malware Analyst investigates and analyzes malware to understand how it works and how to protect against it. They work with other security professionals to develop and implement security measures to prevent and mitigate malware infections. This course can help you prepare for a career as a Malware Analyst by providing you with a foundation in computer and network security. You will learn about cryptography, cryptanalysis, and other security concepts that are essential for understanding and analyzing malware.
Cloud Security Engineer
A Cloud Security Engineer designs and implements security measures for cloud computing environments. They work with other security professionals to ensure that the organization's cloud computing resources are secure from unauthorized access, use, disclosure, disruption, modification, or destruction. This course can help you prepare for a career as a Cloud Security Engineer by providing you with a foundation in computer and network security. You will learn about cryptography, cryptanalysis, and other security concepts that are essential for designing and implementing secure cloud computing environments.
Security Consultant
A Security Consultant provides advice and guidance to organizations on how to improve their security posture. They work with clients to identify vulnerabilities, develop security policies and procedures, and implement security measures. This course can help you prepare for a career as a Security Consultant by providing you with a foundation in computer and network security. You will learn about cryptography, cryptanalysis, and other security concepts that are essential for understanding and mitigating security risks.
Computer Forensics Analyst
A Computer Forensics Analyst investigates and analyzes computer systems and networks to identify and recover evidence of criminal activity. They work with law enforcement and other security professionals to investigate and prosecute cybercrimes. This course can help you prepare for a career as a Computer Forensics Analyst by providing you with a foundation in computer and network security. You will learn about cryptography, cryptanalysis, and other security concepts that are essential for understanding and analyzing digital evidence.
Data Security Analyst
A Data Security Analyst protects an organization's data from unauthorized access, use, disclosure, disruption, modification, or destruction. They work with other security professionals to develop and implement security measures to protect the organization's data assets. This course can help you prepare for a career as a Data Security Analyst by providing you with a foundation in computer and network security. You will learn about cryptography, cryptanalysis, and other security concepts that are essential for understanding and mitigating data security risks.
Blockchain Developer
A Blockchain Developer designs and develops blockchain applications. They work with other software engineers to develop and implement blockchain solutions for a variety of industries. This course can help you prepare for a career as a Blockchain Developer by providing you with a foundation in computer and network security. You will learn about cryptography, cryptanalysis, and other security concepts that are essential for developing secure blockchain applications.
Chief Information Security Officer (CISO)
A Chief Information Security Officer (CISO) is responsible for developing and implementing an organization's security strategy. They work with other executives to ensure that the organization's information assets are protected from unauthorized access, use, disclosure, disruption, modification, or destruction. This course can help you prepare for a career as a CISO by providing you with a foundation in computer and network security. You will learn about cryptography, cryptanalysis, and other security concepts that are essential for understanding and mitigating security risks.

Reading list

We've selected 12 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in GT - Network Security.
Provides a comprehensive overview of security engineering principles and practices, covering topics such as threat modeling, risk assessment, and incident response. It valuable resource for anyone looking to gain a deeper understanding of network security.
Provides a comprehensive overview of network security concepts and technologies, including firewalls, intrusion detection systems, and virtual private networks. It valuable resource for anyone looking to gain a solid foundation in network security.
Provides a comprehensive overview of cryptography and network security, covering topics such as encryption, authentication, and digital signatures. It valuable resource for anyone looking to gain a deeper understanding of the underlying principles of network security.
Provides a comprehensive overview of computer security concepts and technologies, covering topics such as operating system security, application security, and network security. It valuable resource for anyone looking to gain a broad understanding of computer security.
Provides a hands-on guide to network security, covering topics such as firewalls, intrusion detection systems, and virtual private networks. It valuable resource for anyone looking to gain practical experience in network security.
Provides a comprehensive overview of cybersecurity concepts and technologies, covering topics such as risk management, incident response, and cloud security. It valuable resource for anyone looking to gain a broad understanding of cybersecurity.
Provides a basic overview of network security concepts and technologies, covering topics such as firewalls, intrusion detection systems, and virtual private networks. It valuable resource for anyone looking to gain a basic understanding of network security.
Provides a practical guide to web application security, covering topics such as SQL injection, cross-site scripting, and session hijacking. It valuable resource for anyone looking to gain a deeper understanding of the practical aspects of web application security.
Provides a comprehensive overview of computer security concepts and technologies, covering topics such as operating system security, application security, and network security. It valuable resource for anyone looking to gain a broad understanding of computer security.
Provides a comprehensive overview of computer security concepts and technologies, covering topics such as operating system security, application security, and network security. It valuable resource for anyone looking to gain a broad understanding of computer security.
Provides a unique perspective on network security, focusing on the human element of security. It valuable resource for anyone looking to gain a deeper understanding of the social engineering techniques used by attackers.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser