We may earn an affiliate commission when you visit our partners.
Course image
Coursera logo

3. つなぎ、守る:ネットワークとネットワーク セキュリティ

Google Career Certificates

Google サイバーセキュリティ プロフェッショナル認定証の 3 つめのコースです。各コースでは初級サイバーセキュリティの職に必要なスキルを身につけることができます。

Read more

Google サイバーセキュリティ プロフェッショナル認定証の 3 つめのコースです。各コースでは初級サイバーセキュリティの職に必要なスキルを身につけることができます。

このコースでは、ネットワークがどのように複数のデバイスを接続し、通信を可能にするのかを探ります。まず、最新のネットワーク運用とプロトコルの基本を学びます。例えば、TCP/IP モデルについて学び、ルーターやモデムなどのネットワーク ハードウェアによってコンピュータがインターネット上で情報を送受信できる仕組みについて学びます。そして、ネットワーク セキュリティについても学んでいきます。組織は多くの場合、ネットワーク上で貴重な情報を保存・送信するため、ネットワークはサイバー攻撃の一般的なターゲットとなります。このコースを修了すると、ネットワーク レベルの脆弱性を認識できるようになり、ファイアウォールやシステム ハードニング、仮想プライベート ネットワークなどを使って、ネットワークを保護する方法を説明できるようになります。

サイバーセキュリティの分野で働いている現職の Google 社員が最適なツールやリソースを使って一般的なサイバーセキュリティの業務を遂行する実践的な方法を指導します。また就職活動への準備も手助けします。

この認定プログラムを修了すると、エントリーレベルのサイバーセキュリティの職に応募できるようになります。過去の業務経験は不要です。

Enroll now

What's inside

Syllabus

ネットワーク アーキテクチャとは
ここでは、ネットワーク セキュリティについてご紹介するとともに、現在発生しているセキュリティの脅威や脆弱性との関連について解説していきます。また、ネットワーク アーキテクチャとネットワークを保護する仕組みについても学んでいきます。
ネットワーク運用
ここでは、ネットワーク プロトコルやネットワーク通信がどのように脆弱性につながるかについて学びます。 さらに、ネットワーク運用の安全性と信頼性を維持するために役立つ、ファイアウォールなどの一般的なセキュリティ対策についても学びます。
Read more
ネットワーク侵入を安全に防ぐ
ここではネットワーク攻撃の種類と、危険なネットワーク システムやデバイスを保護するために用いるテクニックを理解します。また、悪意ある行為者がネットワーク インフラの脆弱性を利用するさまざまな方法と、サイバーセキュリティ職がその抜け穴を特定し、封じ込める方法について学んでいきます。
セキュリティ ハードニング
ここでは、ネットワーク システムを強化するネットワーク ハードニングの実践について学びます。具体的には、セキュリティ ハードニングが、悪意のある行為者や侵入方法に対していかに防御に役立つかを学んでいきます。また、クラウド インフラ独自のセキュリティ上の課題に対処するために、セキュリティ ハードニングをどう活用するかについても学びます。

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Explains essential cybersecurity threats and vulnerabilities
Introduces the network security infrastructure and different types of threats organizations face
Describes vulnerabilities at network level and how to protect against them using firewalls and system hardening
Covers both the basic knowledge and essential tools in network security
Provides practical guidance from Google employees, offering valuable insights into solving cybersecurity issues
The course is designed for beginners without any cybersecurity background

Save this course

Save 3. つなぎ、守る:ネットワークとネットワーク セキュリティ to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for 3. つなぎ、守る:ネットワークとネットワーク セキュリティ. These are activities you can do either before, during, or after a course.

Career center

Learners who complete 3. つなぎ、守る:ネットワークとネットワーク セキュリティ will develop knowledge and skills that may be useful to these careers:
Network Security Analyst
As a Network Security Analyst, you would be responsible for protecting computer networks from security threats, identifying potential vulnerabilities in network design and configuration, and conducting security audits. This course, which covers network architecture, network security, and network intrusion prevention, may help you build a foundation for this role by showing you how to spot network vulnerabilities, use security tools, and implement security hardening.
Cloud Security Engineer
Cloud Security Engineers are responsible for securing cloud computing environments. This course, which covers network architecture, network security, and network intrusion prevention, may help build a foundation for this role by teaching you how to secure networks and understand cloud security risks.
Network Architect
Network Architects design and implement computer networks. This course, which covers network architecture, network security, and network intrusion prevention, may help build a foundation for this role by teaching you how to design secure networks.
Penetration Tester
Penetration Testers are hired to test the security of computer networks and information systems. This course, which covers network architecture, network security, and network intrusion prevention, may be useful for understanding how networks are attacked and how to defend against those attacks.
Ethical Hacker
Ethical Hackers are hired to test the security of computer networks and information systems. This course, which covers network architecture, network security, and network intrusion prevention, may be useful for understanding how networks are attacked and how to defend against those attacks.
Security Consultant
Security Consultants provide advice and guidance to organizations on how to improve their security posture. This course, which covers network architecture, network security, and network intrusion prevention, may be useful for learning how to assess network security risks and develop mitigation strategies.
Incident Responder
Incident Responders are responsible for responding to cybersecurity incidents. This course, which covers network architecture, network security, and network intrusion prevention, may be useful for learning how to triage incident reports and take appropriate action to mitigate risks.
Security Engineer
Security Engineers design, implement, and maintain security systems to protect computer networks and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. This course, which covers network architecture, network security, and network intrusion prevention, may be useful for developing skills in network security.
Security Auditor
Security Auditors are responsible for conducting security audits to identify vulnerabilities in computer networks and information systems. This course, which covers network architecture, network security, and network intrusion prevention, may be useful for learning how to assess network security risks and develop mitigation strategies.
Information Security Manager
Information Security Managers are responsible for developing and implementing security policies and procedures to protect information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. This course, which covers network architecture, network security, and network intrusion prevention, may be useful for learning about network security risks and how to mitigate them.
Network Operations Center Engineer
Network Operations Center Engineers are responsible for monitoring and maintaining computer networks. This course, which covers network architecture, network security, and network intrusion prevention, may be useful for learning how to secure networks.
Information Security Analyst
Information Security Analysts are responsible for protecting information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. This course, which covers network architecture, network security, and network intrusion prevention, may be useful for learning how to secure networks.
Systems Administrator
Systems Administrators are responsible for managing, operating, and securing computer systems. This course, which covers network architecture, network security, and network intrusion prevention, may be useful for learning how to secure networks.
Cybersecurity Analyst
Cybersecurity Analysts are responsible for identifying, analyzing, and responding to cybersecurity threats. This course, which covers network architecture, network security, and network intrusion prevention, may be useful for learning how to secure networks.
Network Administrator
Network Administrators are responsible for managing, operating, and securing computer networks. This course, which covers network architecture, network security, and network intrusion prevention, may be useful for learning how to implement network security measures.

Reading list

We've selected six books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in 3. つなぎ、守る:ネットワークとネットワーク セキュリティ.
Provides a thorough understanding of how to assess the security of a computer network. covers all facets of network security assessment, including passive and active scanning, IDS, firewalls, and honeypots.
Covers the principles of computer networking, including the TCP/IP protocol suite, network topologies, and network security. Provides a comprehensive understanding of the foundations of computer networking.
Provides a detailed explanation of the TCP/IP protocol suite. Considered a classic reference for network engineers and programmers.
Provides a comprehensive overview of firewalls and VPNs, including their design, implementation, and management.
Provides a comprehensive overview of the Certified Ethical Hacker (CEH) certification, including the exam objectives and study materials.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to 3. つなぎ、守る:ネットワークとネットワーク セキュリティ.
6. 警告を発する: 検知と対応
Most relevant
7. Python を使ったサイバーセキュリティ タスクの自動化
Most relevant
4. ツールを使いこなす:Linux と SQL
Most relevant
5. アセット、脅威、そして脆弱性
Most relevant
8. 実践編:サイバーセキュリティ関連の職に就く準備
Most relevant
2. 安心を担う: セキュリティリスクの管理
Most relevant
1.基礎知識:サイバーセキュリティとは
Most relevant
【教科書英語にさようなら!】 海外に行かずに2024年のリアル英会話をマスターするためのステップバイステップガイド
Most relevant
通訳者が教える 英語筋肉の鍛え方と使い方 / 誰でも英語が話せるようになる発音練習法A to Zその4・発音編
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser