- Level Foundation
- المدة 26 ساعات hours
- الطبع بواسطة University of London
-
Offered by
عن
The security of computer networks is a key element in cyber security. Computer networking provides the foundational connectivity services that are used for the world wide web, distributed computer applications and services, operations and manufacturing, and national infrastructure. This course provides understanding of key technologies used in computer networks and infrastructure. This includes protocols, computer networks, data centres, operational technologies that form key infrastructure critical to the success of organisations and services from a local to an international scale. The course discusses vulnerabilities and the exploits that target computer networks, systems, and the Internet infrastructure. By the end of this course learners will be able to: 1. Show a systematic understanding of digital networks and their operation, including the OSI 7 layer architecture and the TCP/IP protocol stack. 2. Discuss key security threats and risks faced in computer networks. 3. Demonstrate a critical understanding of network security architecture and design rationale of selected protocols, security technologies and how they are used in practice. 4. Identify attack models and analyse vulnerabilities in protocols, network systems, and applications. 5. Demonstrate how these vulnerabilities may be exploited in practice to penetrate a system.الوحدات
Introduction to the course
1
Discussions
- Getting to know each other
1
Videos
- Introduction to the course and computer networks
3
Readings
- Course syllabus
- Starting your studies
- Study journal reflection – expectations
Week 1 introduction
1
Videos
- Introduction to week 1
1.1 Introduction to network and infrastructure security
1
Discussions
- Critical thinking exercise: Adversaries in a network
2
Videos
- Introduction to key concepts of computer networks
- Adversaries in a network
2
Readings
- Study journal reflection – essentials of network security
- Computer networks - foundation
Week 1 conclusion
1
Assignment
- Week 1 test
1
Videos
- Week 1 summary
Week 2 introduction
1
Videos
- Introduction to week 2
2.1 Network layers
1
Discussions
- Critical thinking exercise: A tin can network for the neighbourhood
3
Videos
- An abstract view on network communication – packets, channels, and applications
- A thought experiment - The tin can network
- Layers above – how to go large scale
2
Readings
- Study journal reflection – abstraction and modularity in Computer Science
- Computer networks - foundation
2.2 Data links and the internet protocol
1
Discussions
- MAC spoofing
1
Videos
- The data link layer
3
Readings
- Computer networks - direct links
- Lab exercise: Wireshark
- Computer networks - switched ethernet
Week 2 conclusion
1
Assignment
- Week 2 test
1
Videos
- Week 2 summary
Week 3 introduction
1
Videos
- Introduction to week 3
3.1 The Internet Protocol – The internetworking layer at a local scale
1
Discussions
- DHCP spoofing
4
Videos
- Addressing in the internet protocol
- ARP spoofing
- Dynamic host configuration protocol (DHCP)
- Routing - connecting separate IP networks
4
Readings
- Computer networks - Internet protocol (IP)
- Lab exercise: ARP
- Dynamic host configuration protocol (DHCP)
- Computer networks - routing
Week 3 conclusion
1
Assignment
- Week 3 test
1
Videos
- Week 3 summary
Week 4 introduction
1
Videos
- Introduction to week 4
4.1 Internetworking layer and dynamic routing
1
Discussions
- Data transfer via the Internet
2
Videos
- Dynamic routing - How to run IP on a large scale
- Internet control message protocol (ICMP)
2
Readings
- Computer networks - routing
- BGP attacks
4.2 Transport layer
1
Videos
- Transport layer
1
Readings
- Computer networks - end-to-end protocols
Week 4 conclusion
1
Assignment
- Week 4 test
1
Videos
- Week 4 summary
Week 5 introduction
1
Videos
- Introduction to week 5
5.1 TCP
1
Discussions
- Critical thinking exercise: TCP and UDP spoofing
1
Videos
- TCP - Introducing channels for communication
2
Readings
- Computer networks - reliable byte stream (TCP)
- Lab exercise: Wireshark on TCP
5.2 Upper layers, including application
2
Videos
- Application layers – Here be dragons
- Wrap up layering
2
Readings
- Session and presentation layers in the OSI model
- Computer networks - application protocols
Week 5 conclusion
1
Assignment
- Week 5 test
1
Videos
- Week 5 summary
Week 6 introduction
1
Videos
- Introduction to week 6
6.1 Secure channels, the key binding problem, and public-key infrastructures
1
Discussions
- Applications for secure channels
2
Videos
- Secure Channels
- Authentication of a Secure Channel
3
Readings
- Computer networks - network security
- Computer networks - key predistribution
- Lab exercise: Certificates
6.2 The Transport layer security protocol (TLS)
1
Videos
- The Transport Layer Security Protocol
2
Readings
- Transport Layer Security
- Technical talks from the Real World Crypto (RWC) conference in 2018
Week 6 conclusion
1
Assignment
- Week 6 test
1
Videos
- Week 6 summary
End of the course
1
Discussions
- Reflection on your study
1
Videos
- MOOC summary
Auto Summary
"Introduction to Network Security" is a foundational IT & Computer Science course designed to provide a comprehensive understanding of key network technologies, protocols, and security threats. Led by Coursera, this 1560-minute course covers the OSI 7 layer architecture, TCP/IP protocol stack, and critical vulnerabilities. Ideal for beginners, it offers a systematic approach to network security, from identifying risks to understanding attack models and exploiting vulnerabilities. Subscription options include a Starter plan, making it accessible for those aiming to fortify their network security knowledge.

Guido Schmitz