We may earn an affiliate commission when you visit our partners.
Course image
- IBM -

Please Note: Learners who successfully complete this IBM course can earn a skill badge — a detailed, verifiable and digital credential that profiles the knowledge and skills you’ve acquired in this course. Enroll to learn more, complete the course and claim your badge!

Read more

Please Note: Learners who successfully complete this IBM course can earn a skill badge — a detailed, verifiable and digital credential that profiles the knowledge and skills you’ve acquired in this course. Enroll to learn more, complete the course and claim your badge!

This course gives you the background needed to understand basic types of network security. You will learn about computer networks including Local Area Networks, TCP/IP, the OSI Framework and routing basics. You will learn how networking affects security systems within an organization and network security controls that guard an organization from cybersecurity attacks.

In addition to networking, you will learn about database vulnerabilities and the tools/knowledge needed to research a database vulnerability for a variety of databases including SQL Injection, Oracle, Mongo and Couch. You will learn about various security data types associated with databases and organizations that define standards and provide tools for cybersecurity professionals. Ultimately you will learn how to safeguard an organizations sensitive information against data loss from cyberattacks.

This course will give you a basic understanding of network security and sensitive data protection services or as part of the overall Cybersecurity basics professional certificate.

What you'll learn

  • Understand network basics around the TCP/IP and OSI Models.

  • Describe the differences between IPS and IDS Systems.

  • Discuss Layer 2 and Layer 3 network addressing.

  • Describe how Ethernet networks work.

  • Understand IP addressing, network address translation and packet sniffing.

  • Describe application and transport protocols , UDP and TCP.

  • Describe DNS and DHCP servers.

  • Describe key characteristics of different data types and models.

  • Discuss different data structures.

  • Discuss options for protecting your data.

Three deals to help you save

What's inside

Syllabus

Module 1: TCP/IP Framework
In this module, you will learn about the TCP/IP Framework, Ethernet and Lan Networks, and the basics around routing and switching. You will also learn about address translation and the basic differences between Intrusion Detection and Intrusion Prevention Systems. Finally, you will learn about network packets.
Read more
Module 2: Basics of IP Addressing and the OSI Model
In this module, you will learn the basics of IP Addressing and how it affects the network traffic routing. You will about application and transport protocols. You will learn about firewalls and additional information in regards to Intrusion Detection and Intrusion prevention systems. Finally, you will learn the concepts of high availability and clustering.
Module 3: Introduction to Databases
In this module you will learn to define data source and model types as well as types of data. You will also review how to use best practices to secure your organizations data. Finally, you will get an in depth look at use cases around an example of a Data Protection solution, IBM Security Guardium.
Module 4: Deep Dive - Injection Vulnerability
In this module you will hear an IBM Subject Matter expert discuss the common vulnerability of Injection. You will learn the basics around OS Command Injection and SQL Injection.

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Explores foundational topics for network security, making it helpful for beginners to strengthen an existing foundation for intermediate learners
Taught by IBM, who are recognized for their work in IT and global cybersecurity
Helps build a strong foundation for identifying database vulnerabilities and implementing cybersecurity controls to keep data safe

Save this course

Save Basic Network and Database Security to your list so you can find it easily later:
Save

Reviews summary

Highly-rated course

According to learners, Basic Network and Database Security is a fantastic course. One reviewer mentioned that this course was outstanding.

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Basic Network and Database Security with these activities:
TCP/IP review
Reviewing TCP/IP will help you hit the ground running when learning about the OSI Framework and routing basics.
Browse courses on TCP/IP
Show steps
  • Review the basics of the TCP/IP model
  • Understand how IP addresses are assigned
  • Learn about the different types of IP addresses
Glossary of networking terms
Creating a glossary will solidify your knowledge of key networking terms and concepts you learn in this course.
Show steps
  • Create a document or spreadsheet
  • List the networking terms you want to include
  • Define each term
Online tutorials on Intrusion Detection Systems
Completing tutorials on Intrusion Detection Systems will build on your knowledge of IPS and IDS Systems and strengthen your understanding of network security controls.
Show steps
  • Find online tutorials on Intrusion Detection Systems
  • Follow the tutorials and complete the exercises
  • Test your knowledge by taking quizzes or completing hands-on labs
Three other activities
Expand to see all activities and additional details
Show all six activities
Practice IP addressing and subnetting
Engaging in practice drills will increase your proficiency in IP addressing and subnetting, which are foundational concepts in networking.
Browse courses on IP Addressing
Show steps
  • Find practice drills online or in textbooks
  • Complete the drills and check your answers
  • Repeat the drills until you are comfortable with the concepts
Help other students in the course
Mentoring others will allow you to practice explaining networking concepts and improve your understanding of the material.
Show steps
  • Identify a student who needs help
  • Offer your help and schedule a time to meet
  • Review the material with the student
  • Answer their questions
Develop a network security plan
Putting together a network security plan will reinforce what you learn about network security vulnerabilities and how to protect an organization from cyberattacks.
Show steps
  • Identify the assets that need to be protected
  • Identify the threats to those assets
  • Develop a plan to mitigate the risks
  • Implement the plan
  • Monitor the plan and make adjustments as needed

Career center

Learners who complete Basic Network and Database Security will develop knowledge and skills that may be useful to these careers:
Database Administrator
Database Administrators are responsible for the design, implementation, maintenance, and security of databases. They work with database management systems, such as SQL Server, Oracle, and MySQL, to ensure that data is stored and managed efficiently. This course will provide you with a foundation in database security, which is essential for protecting data from unauthorized access and cyberattacks.
IT Auditor
IT Auditors are responsible for auditing an organization's IT systems and processes to ensure that they are secure and compliant with regulations. They work with security teams and stakeholders to identify security risks and develop strategies to mitigate those risks. This course will provide you with a foundation in network security and database security, which are essential for auditing an organization's IT systems and processes.
Network Administrator
Network Administrators are responsible for the design, implementation, and maintenance of computer networks. They work with network hardware and software, such as routers, switches, and firewalls, to ensure that networks are running smoothly and securely. This course will provide you with a foundation in network security, which is essential for protecting networks from unauthorized access and cyberattacks.
Information Security Analyst
Information Security Analysts are responsible for protecting an organization's computer systems and networks from cyberattacks. They work with security tools and technologies, such as firewalls, intrusion detection systems, and encryption, to identify and mitigate security risks. This course will provide you with a foundation in network security, which is essential for protecting networks from unauthorized access and cyberattacks.
Security Engineer
Security Engineers are responsible for implementing and maintaining security solutions for an organization. They work with security teams and stakeholders to identify security risks and develop strategies to mitigate those risks. This course will provide you with a foundation in network security and database security, which are essential for implementing and maintaining effective security solutions.
Cybersecurity Analyst
Cybersecurity Analysts are responsible for analyzing and investigating cybersecurity threats. They work with security teams and stakeholders to identify security risks and develop strategies to mitigate those risks. This course will provide you with a foundation in network security and database security, which are essential for analyzing and investigating cybersecurity threats.
Security Consultant
Security Consultants are responsible for providing security advice and guidance to organizations. They work with clients to identify security risks and develop strategies to mitigate those risks. This course will provide you with a foundation in network security and database security, which are essential for providing effective security advice and guidance to organizations.
Incident Responder
Incident Responders are responsible for responding to and mitigating security incidents. They work with security teams and stakeholders to identify security risks and develop strategies to mitigate those risks. This course will provide you with a foundation in network security and database security, which are essential for responding to and mitigating security incidents.
Penetration Tester
Penetration Testers are responsible for testing an organization's security systems and networks to identify vulnerabilities. They work with security teams and stakeholders to identify security risks and develop strategies to mitigate those risks. This course will provide you with a foundation in network security, which is essential for testing an organization's security systems and networks to identify vulnerabilities.
Malware Analyst
Malware Analysts are responsible for analyzing and researching malware to identify its behavior and develop strategies to mitigate its impact. They work with security teams and stakeholders to identify security risks and develop strategies to mitigate those risks. This course will provide you with a foundation in network security and database security, which are essential for analyzing and researching malware to identify its behavior and develop strategies to mitigate its impact.
Security Architect
Security Architects are responsible for designing and implementing security solutions for an organization. They work with security teams and stakeholders to identify security risks and develop strategies to mitigate those risks. This course will provide you with a foundation in network security and database security, which are essential for designing and implementing effective security solutions.
Security Researcher
Security Researchers are responsible for researching and developing new security technologies and solutions. They work with security teams and stakeholders to identify security risks and develop strategies to mitigate those risks. This course will provide you with a foundation in network security and database security, which are essential for researching and developing new security technologies and solutions.
Forensic Analyst
Forensic Analysts are responsible for investigating and analyzing computer systems and networks to identify and recover evidence of cybercrimes. They work with law enforcement and security teams to identify and mitigate security risks. This course will provide you with a foundation in network security and database security, which are essential for investigating and analyzing computer systems and networks to identify and recover evidence of cybercrimes.
Security Operations Center Analyst
Security Operations Center Analysts are responsible for monitoring and analyzing security events to identify and mitigate security risks. They work with security teams and stakeholders to identify security risks and develop strategies to mitigate those risks. This course will provide you with a foundation in network security and database security, which are essential for monitoring and analyzing security events to identify and mitigate security risks.
Data Protection Analyst
Data Protection Analysts are responsible for protecting an organization's data from unauthorized access and cyberattacks. They work with security teams and stakeholders to identify security risks and develop strategies to mitigate those risks. This course will provide you with a foundation in database security, which is essential for protecting an organization's data from unauthorized access and cyberattacks.

Reading list

We've selected nine books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Basic Network and Database Security.
Classic reference on the TCP/IP protocol suite. It provides a detailed explanation of how TCP/IP works, and valuable resource for anyone who wants to understand the inner workings of the Internet.
Provides a comprehensive overview of computer networks, covering topics such as network architecture, protocols, and security. It good reference for students and professionals who want to gain a deeper understanding of networking concepts.
Provides a comprehensive overview of computer security concepts and practices. It good resource for students and professionals who want to learn about the latest security threats and how to protect against them.
Provides a comprehensive overview of network security concepts and standards. It good resource for students and professionals who want to learn about the latest security threats and how to protect against them.
Provides a detailed overview of data protection for databases. It covers topics such as data encryption, access control, and backup and recovery. It valuable resource for anyone who is responsible for securing a database.
Provides a detailed overview of the IBM Data Protection Platform. It covers topics such as data backup, recovery, and security. It valuable resource for anyone who is responsible for managing data protection for an IBM environment.
Provides a practical guide to database security. It covers topics such as database vulnerabilities, security controls, and risk management. It valuable resource for anyone who is responsible for securing a database.
Provides a hands-on approach to ethical hacking. It covers topics such as network reconnaissance, vulnerability assessment, and penetration testing. It valuable resource for anyone who wants to learn about the techniques used by hackers.
Provides a comprehensive overview of SQL injection attacks and how to defend against them. It valuable resource for anyone who wants to learn about this common security threat.

Share

Help others find this course page by sharing it with your friends and followers:
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser