We may earn an affiliate commission when you visit our partners.
Course image
Google Career Certificates

Google サイバーセキュリティ プロフェッショナル認定証の 3 つめのコースです。各コースでは初級サイバーセキュリティの職に必要なスキルを身につけることができます。

このコースでは、ネットワークがどのように複数のデバイスを接続し、通信を可能にするのかを探ります。まず、最新のネットワーク運用とプロトコルの基本を学びます。例えば、TCP/IP モデルについて学び、ルーターやモデムなどのネットワーク ハードウェアによってコンピュータがインターネット上で情報を送受信できる仕組みについて学びます。そして、ネットワーク セキュリティについても学んでいきます。組織は多くの場合、ネットワーク上で貴重な情報を保存・送信するため、ネットワークはサイバー攻撃の一般的なターゲットとなります。このコースを修了すると、ネットワーク レベルの脆弱性を認識できるようになり、ファイアウォールやシステム ハードニング、仮想プライベート ネットワークなどを使って、ネットワークを保護する方法を説明できるようになります。

サイバーセキュリティの分野で働いている現職の Google 社員が最適なツールやリソースを使って一般的なサイバーセキュリティの業務を遂行する実践的な方法を指導します。また就職活動への準備も手助けします。

Read more

Google サイバーセキュリティ プロフェッショナル認定証の 3 つめのコースです。各コースでは初級サイバーセキュリティの職に必要なスキルを身につけることができます。

このコースでは、ネットワークがどのように複数のデバイスを接続し、通信を可能にするのかを探ります。まず、最新のネットワーク運用とプロトコルの基本を学びます。例えば、TCP/IP モデルについて学び、ルーターやモデムなどのネットワーク ハードウェアによってコンピュータがインターネット上で情報を送受信できる仕組みについて学びます。そして、ネットワーク セキュリティについても学んでいきます。組織は多くの場合、ネットワーク上で貴重な情報を保存・送信するため、ネットワークはサイバー攻撃の一般的なターゲットとなります。このコースを修了すると、ネットワーク レベルの脆弱性を認識できるようになり、ファイアウォールやシステム ハードニング、仮想プライベート ネットワークなどを使って、ネットワークを保護する方法を説明できるようになります。

サイバーセキュリティの分野で働いている現職の Google 社員が最適なツールやリソースを使って一般的なサイバーセキュリティの業務を遂行する実践的な方法を指導します。また就職活動への準備も手助けします。

この認定プログラムを修了すると、エントリーレベルのサイバーセキュリティの職に応募できるようになります。過去の業務経験は不要です。

Enroll now

What's inside

Syllabus

ネットワーク アーキテクチャとは
ここでは、ネットワーク セキュリティについてご紹介するとともに、現在発生しているセキュリティの脅威や脆弱性との関連について解説していきます。また、ネットワーク アーキテクチャとネットワークを保護する仕組みについても学んでいきます。
ネットワーク運用
ここでは、ネットワーク プロトコルやネットワーク通信がどのように脆弱性につながるかについて学びます。 さらに、ネットワーク運用の安全性と信頼性を維持するために役立つ、ファイアウォールなどの一般的なセキュリティ対策についても学びます。
Read more
ネットワーク侵入を安全に防ぐ
ここではネットワーク攻撃の種類と、危険なネットワーク システムやデバイスを保護するために用いるテクニックを理解します。また、悪意ある行為者がネットワーク インフラの脆弱性を利用するさまざまな方法と、サイバーセキュリティ職がその抜け穴を特定し、封じ込める方法について学んでいきます。
セキュリティ ハードニング
ここでは、ネットワーク システムを強化するネットワーク ハードニングの実践について学びます。具体的には、セキュリティ ハードニングが、悪意のある行為者や侵入方法に対していかに防御に役立つかを学んでいきます。また、クラウド インフラ独自のセキュリティ上の課題に対処するために、セキュリティ ハードニングをどう活用するかについても学びます。

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Explains essential cybersecurity threats and vulnerabilities
Introduces the network security infrastructure and different types of threats organizations face
Describes vulnerabilities at network level and how to protect against them using firewalls and system hardening
Covers both the basic knowledge and essential tools in network security
Provides practical guidance from Google employees, offering valuable insights into solving cybersecurity issues
The course is designed for beginners without any cybersecurity background

Save this course

Save 3. つなぎ、守る:ネットワークとネットワーク セキュリティ to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in 3. つなぎ、守る:ネットワークとネットワーク セキュリティ with these activities:
Review the OSI model and network protocols
Refresh your understanding of the fundamental concepts of network architecture and communication.
Browse courses on OSI Model
Show steps
  • Review the OSI model layers and their functions
  • Study common network protocols such as TCP/IP and UDP
  • Understand how network protocols work together to enable communication
Gather and organize resources on network security best practices
Enhance your knowledge of effective network security measures by compiling a collection of best practices and resources.
Browse courses on network security
Show steps
  • Search for online resources on network security best practices
  • Identify reputable sources such as industry reports and white papers
  • Extract key insights and recommendations
  • Organize the resources into a coherent format, such as a document or presentation
Join a study group for network security concepts
Enhance your understanding and retention of network security concepts by engaging in discussions and knowledge-sharing sessions with peers.
Browse courses on network security
Show steps
  • Find or join a study group focused on network security
  • Attend regular study sessions
  • Participate in discussions and ask questions
  • Share your own knowledge and insights
Four other activities
Expand to see all activities and additional details
Show all seven activities
Practice configuring firewalls using network security exercises
Strengthen your understanding of network security by practicing firewall configuration in a simulated environment.
Browse courses on network security
Show steps
  • Find network security exercises that focus on firewall configuration
  • Set up a virtual environment for the exercises
  • Configure firewalls according to the exercise instructions
  • Test the effectiveness of your firewall configurations
Attend a cybersecurity workshop focused on network protection
Enhance your practical skills and knowledge of network protection techniques by attending a specialized workshop.
Browse courses on network security
Show steps
  • Find a cybersecurity workshop focused on network protection
  • Register and attend the workshop
  • Participate actively in the hands-on exercises and discussions
  • Apply the lessons learned to your own network security practices
Follow a hands-on guide to deploying a website on a Linux server
Practice deploying a website on a Linux server to reinforce your understanding of network architecture and security.
Browse courses on Linux Administration
Show steps
  • Find a tutorial on deploying a website on a Linux server
  • Set up a Linux server
  • Install the necessary software
  • Deploy your website
  • Test your website
Design a network security architecture for a real-world scenario
Apply your knowledge of network architecture and security to create a practical design that addresses real-world security challenges.
Browse courses on Network Architecture
Show steps
  • Identify a real-world scenario
  • Research network security best practices
  • Design a network architecture that meets the security requirements
  • Create a detailed documentation of your design

Career center

Learners who complete 3. つなぎ、守る:ネットワークとネットワーク セキュリティ will develop knowledge and skills that may be useful to these careers:
Network Security Analyst
As a Network Security Analyst, you would be responsible for protecting computer networks from security threats, identifying potential vulnerabilities in network design and configuration, and conducting security audits. This course, which covers network architecture, network security, and network intrusion prevention, may help you build a foundation for this role by showing you how to spot network vulnerabilities, use security tools, and implement security hardening.
Cloud Security Engineer
Cloud Security Engineers are responsible for securing cloud computing environments. This course, which covers network architecture, network security, and network intrusion prevention, may help build a foundation for this role by teaching you how to secure networks and understand cloud security risks.
Network Architect
Network Architects design and implement computer networks. This course, which covers network architecture, network security, and network intrusion prevention, may help build a foundation for this role by teaching you how to design secure networks.
Penetration Tester
Penetration Testers are hired to test the security of computer networks and information systems. This course, which covers network architecture, network security, and network intrusion prevention, may be useful for understanding how networks are attacked and how to defend against those attacks.
Ethical Hacker
Ethical Hackers are hired to test the security of computer networks and information systems. This course, which covers network architecture, network security, and network intrusion prevention, may be useful for understanding how networks are attacked and how to defend against those attacks.
Security Consultant
Security Consultants provide advice and guidance to organizations on how to improve their security posture. This course, which covers network architecture, network security, and network intrusion prevention, may be useful for learning how to assess network security risks and develop mitigation strategies.
Incident Responder
Incident Responders are responsible for responding to cybersecurity incidents. This course, which covers network architecture, network security, and network intrusion prevention, may be useful for learning how to triage incident reports and take appropriate action to mitigate risks.
Security Engineer
Security Engineers design, implement, and maintain security systems to protect computer networks and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. This course, which covers network architecture, network security, and network intrusion prevention, may be useful for developing skills in network security.
Security Auditor
Security Auditors are responsible for conducting security audits to identify vulnerabilities in computer networks and information systems. This course, which covers network architecture, network security, and network intrusion prevention, may be useful for learning how to assess network security risks and develop mitigation strategies.
Information Security Manager
Information Security Managers are responsible for developing and implementing security policies and procedures to protect information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. This course, which covers network architecture, network security, and network intrusion prevention, may be useful for learning about network security risks and how to mitigate them.
Network Operations Center Engineer
Network Operations Center Engineers are responsible for monitoring and maintaining computer networks. This course, which covers network architecture, network security, and network intrusion prevention, may be useful for learning how to secure networks.
Information Security Analyst
Information Security Analysts are responsible for protecting information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. This course, which covers network architecture, network security, and network intrusion prevention, may be useful for learning how to secure networks.
Systems Administrator
Systems Administrators are responsible for managing, operating, and securing computer systems. This course, which covers network architecture, network security, and network intrusion prevention, may be useful for learning how to secure networks.
Cybersecurity Analyst
Cybersecurity Analysts are responsible for identifying, analyzing, and responding to cybersecurity threats. This course, which covers network architecture, network security, and network intrusion prevention, may be useful for learning how to secure networks.
Network Administrator
Network Administrators are responsible for managing, operating, and securing computer networks. This course, which covers network architecture, network security, and network intrusion prevention, may be useful for learning how to implement network security measures.

Reading list

We've selected six books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in 3. つなぎ、守る:ネットワークとネットワーク セキュリティ.
Provides a thorough understanding of how to assess the security of a computer network. covers all facets of network security assessment, including passive and active scanning, IDS, firewalls, and honeypots.
Covers the principles of computer networking, including the TCP/IP protocol suite, network topologies, and network security. Provides a comprehensive understanding of the foundations of computer networking.
Provides a detailed explanation of the TCP/IP protocol suite. Considered a classic reference for network engineers and programmers.
Provides a comprehensive overview of firewalls and VPNs, including their design, implementation, and management.
Provides a comprehensive overview of the Certified Ethical Hacker (CEH) certification, including the exam objectives and study materials.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to 3. つなぎ、守る:ネットワークとネットワーク セキュリティ.
6. 警告を発する: 検知と対応
Most relevant
7. Python を使ったサイバーセキュリティ タスクの自動化
Most relevant
4. ツールを使いこなす:Linux と SQL
Most relevant
5. アセット、脅威、そして脆弱性
Most relevant
8. 実践編:サイバーセキュリティ関連の職に就く準備
Most relevant
2. 安心を担う: セキュリティリスクの管理
Most relevant
1.基礎知識:サイバーセキュリティとは
Most relevant
【教科書英語にさようなら!】 海外に行かずに2024年のリアル英会話をマスターするためのステップバイステップガイド
Most relevant
通訳者が教える 英語筋肉の鍛え方と使い方 / 誰でも英語が話せるようになる発音練習法A to Zその4・発音編
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser