- Level Foundation
- المدة 31 ساعات hours
- الطبع بواسطة EC-Council
-
Offered by
عن
Network Defense Essentials covers the fundamental concepts of information security and network defense. This introductory cybersecurity course is designed for today's entry-level information security or cybersecurity careers and is ideal for learners aspiring to pursue a career in cybersecurity. The course gives a holistic overview of the key components of Information Security such as Identification, Authentication and Authorization, Virtualization and Cloud Computing, Wireless Networks, Mobile and IoT Devices, and Data Security. The interactive labs component of this course ensures that learners receive the hands-on, practical experience required for a future in cybersecurity. NDE-certified learners have an assured means of formal recognition to add to their resumes and show off their expertise and skills to prospective employers. The purpose of the NDE certification is to recognize the competency and expertise of a professional in network defense and information security skills, thereby adding value to their workplace and employer.الوحدات
Course Introduction
1
Videos
- Course Introduction
Module Introduction
1
Videos
- Introduction
Understanding the Goals of Network Defense
1
Assignment
- Understanding the Goals of Network Defense
1
Videos
- Understanding the Goals of Network Defense
Understanding Information Assurance (IA) Principles
1
Assignment
- Understanding Information Assurance (IA) Principles
1
Videos
- Understanding Information Assurance (IA) Principles
Understanding the Benefits and Challenges of Network Defense
1
Assignment
- Understanding the Benefits and Challenges of Network Defense
1
Videos
- Understanding the Benefits and Challenges of Network Defense
Overview of Different Types of Network Defense Approaches
1
Assignment
- Overview of Different Types of Network Defense Approaches
1
Videos
- Overview of Different Types of Network Defense Approaches
Understanding the Different Types of Network Security Controls
1
Assignment
- Understanding the Different Types of Network Security Controls
1
Videos
- Understanding the Different Types of Network Security Controls
Understanding the Different Network Security Protocols
2
Assignment
- Understanding the Different Network Security Protocols
- Network Security Fundamentals
1
Videos
- Understanding the Different Network Security Protocols
Module Introduction
1
Videos
- Introduction
Understanding the Terminology, Principles, and Models of Access Control
1
Assignment
- Understanding the Terminology, Principles, and Models of Access Control
1
Videos
- Understanding the Terminology, Principles, and Models of Access Control
Understanding Identity and Access Management (IAM)
1
Assignment
- Understanding Identity and Access Management (IAM)
1
Videos
- Understanding Identity and Access Management (IAM)
Understanding User Access Management
1
Assignment
- Understanding User Access Management
1
Videos
- Understanding User Access Management
Overview of Different Types of Authentication
1
Assignment
- Overview of Different Types of Authentication
1
Videos
- Overview of Different Types of Authentication
Overview of Different Types of Authorization
1
Assignment
- Overview of Different Types of Authorization
1
Videos
- Overview of Different Types of Authorization
Understanding User Accounting
2
Assignment
- Understanding User Accounting
- Identification, Authentication, and Authorization
1
Videos
- Understanding User Accounting
Module Introduction
1
Videos
- Introduction
Understanding Why Organizations Need Compliance
1
Assignment
- Understanding Why Organizations Need Compliance
1
Videos
- Understanding Why Organizations Need Compliance
Understanding Various Regulatory Frameworks, Laws, and Acts
1
Assignment
- Understanding Various Regulatory Frameworks, Laws, and Acts
1
Videos
- Understanding Various Regulatory Frameworks, Laws, and Acts
Understanding the Need for and Characteristics of Good Security Policy
1
Assignment
- Understanding the Need for and Characteristics of Good Security Policy
1
Videos
- Understanding the Need for and Characteristics of Good Security Policy
Understanding How to Design and Develop Security Policies
1
Assignment
- Understanding How to Design and Develop Security Policies
1
Videos
- Understanding How to Design and Develop Security Policies
Overview of Different Types of Security Policies
1
Assignment
- Overview of Different Types of Security Policies
1
Videos
- Overview of Different Types of Security Policies
Understanding the Different Types of Security and Awareness Training
2
Assignment
- Understanding the Different Types of Security and Awareness Training
- Network Security Controls - Administrative Controls
1
Videos
- Understanding the Different Types of Security and Awareness Training
Module Introduction
1
Videos
- Introduction
Understanding the Importance of Physical Security
1
Assignment
- Understanding the Importance of Physical Security
1
Videos
- Understanding the Importance of Physical Security
Understanding the Physical Security Attack Vectors
1
Assignment
- Understanding the Physical Security Attack Vectors
1
Videos
- Understanding the Physical Security Attack Vectors
Understanding the Various Types of Physical Security Controls
1
Assignment
- Understanding the Various Types of Physical Security Controls
1
Videos
- Understanding the Various Types of Physical Security Controls
Understanding the Importance of Workplace Security
1
Assignment
- Understanding the Importance of Workplace Security
1
Videos
- Understanding the Importance of Workplace Security
Overview of Physical Security Policy
1
Assignment
- Overview of Physical Security Policy
1
Videos
- Overview of Physical Security Policy
Understanding the Various Environmental Controls
2
Assignment
- Understanding the Various Environmental Controls
- Network Security Controls - Physical Controls
1
Videos
- Understanding the Various Environmental Controls
Module Introduction
1
Videos
- Introduction
Understanding Network Segmentation and its Types
1
Assignment
- Understanding Network Segmentation and its Types
1
Videos
- Understanding Network Segmentation and its Types
Understanding the Different Types of Firewalls and their Roles
1
Assignment
- Understanding the Different Types of Firewalls and their Roles
1
Videos
- Understanding the Different Types of Firewalls and their Roles
Understanding the Different Types of IDS/IPS and their Roles
1
Assignment
- Understanding the Different Types of IDS/IPS and their Roles
1
Videos
- Understanding the Different Types of IDS/IPS and their Roles
Overview of Different Types of Honeypots
1
Assignment
- Overview of Different Types of Honeypots
1
Videos
- Overview of Different Types of Honeypots
Understanding the Different Types of Proxy Servers and their Benefits
1
Assignment
- Understanding the Different Types of Proxy Servers and their Benefits
1
Videos
- Understanding the Different Types of Proxy Servers and their Benefits
Understanding the Fundamentals of Virtual Private Networks (VPNs) and their Importance in Network Security
1
Assignment
- Understanding the Fundamentals of Virtual Private Networks (VPNs) and their Importance in Network Security
1
Videos
- Understanding the Fundamentals of Virtual Private Networks (VPNs) and their Importance in Network Security
Overview of Security Incident and Event Management (SIEM) and User Behavior Analytics (UBA)
1
Assignment
- Overview of Security Incident and Event Management (SIEM) and User Behavior Analytics (UBA)
1
Videos
- Overview of Security Incident and Event Management (SIEM) and User Behavior Analytics (UBA)
Overview of Various Antivirus/Anti-malware Software
2
Assignment
- Overview of Various Antivirus/Anti-malware Software
- Network Security Controls - Technical Controls
1
Videos
- Overview of Various Antivirus/Anti-malware Software
Module Introduction
1
Videos
- Introduction
Understanding Virtualization, its Components, and Virtualization Enablers
1
Assignment
- Understanding Virtualization, its Components, and Virtualization Enablers
1
Videos
- Understanding Virtualization, its Components, and Virtualization Enablers
Understanding OS Virtualization Security and Concerns
1
Assignment
- Understanding OS Virtualization Security and Concerns
1
Videos
- Understanding OS Virtualization Security and Concerns
Understanding the Best Practices for OS Virtualization Security
1
Assignment
- Understanding the Best Practices for OS Virtualization Security
1
Videos
- Understanding the Best Practices for OS Virtualization Security
Understanding Cloud Computing and its Benefits
1
Assignment
- Understanding Cloud Computing and its Benefits
1
Videos
- Understanding Cloud Computing and its Benefits
Overview of Different Types of Cloud Computing Services
1
Assignment
- Overview of Different Types of Cloud Computing Services
1
Videos
- Overview of Different Types of Cloud Computing Services
Overview of Cloud Deployment Models
1
Assignment
- Overview of Cloud Deployment Models
1
Videos
- Overview of Cloud Deployment Models
Understanding Importance of Cloud Security and its Best Practices
2
Assignment
- Understanding Importance of Cloud Security and its Best Practices
- Virtualization and Cloud Computing
1
Videos
- Understanding Importance of Cloud Security and its Best Practices
Module Introduction
1
Videos
- Introduction
Understanding the Wireless Terminology, Wireless Networks, and Wireless Standards
1
Assignment
- Understanding the Wireless Terminology, Wireless Networks, and Wireless Standards
1
Videos
- Understanding the Wireless Terminology, Wireless Networks, and Wireless Standards
Understanding the Wireless Network Topologies and Classification of Wireless Networks
1
Assignment
- Understanding the Wireless Network Topologies and Classification of Wireless Networks
1
Videos
- Understanding the Wireless Network Topologies and Classification of Wireless Networks
Understanding the Components of a Wireless Network
1
Assignment
- Understanding the Components of a Wireless Network
1
Videos
- Understanding the Components of a Wireless Network
Overview of Wireless Network Encryption Mechanisms
1
Assignment
- Overview of Wireless Network Encryption Mechanisms
1
Videos
- Overview of Wireless Network Encryption Mechanisms
Understanding the Different Types of Wireless Network Authentication Methods
1
Assignment
- Understanding the Different Types of Wireless Network Authentication Methods
1
Videos
- Understanding the Different Types of Wireless Network Authentication Methods
Understanding Wireless Network Security Measures and Wireless Security Tools
2
Assignment
- Understanding Wireless Network Security Measures and Wireless Security Tools
- Wireless Network Security
1
Videos
- Understanding Wireless Network Security Measures and Wireless Security Tools
Module Introduction
1
Videos
- Introduction
Understanding the Various Mobile Device Connection Methods
1
Assignment
- Understanding the Various Mobile Device Connection Methods
1
Videos
- Understanding the Various Mobile Device Connection Methods
Understanding the Concepts of Mobile Device Management
1
Assignment
- Understanding the Concepts of Mobile Device Management
1
Videos
- Understanding the Concepts of Mobile Device Management
Understanding the Common Mobile Use Approaches in Enterprises
1
Assignment
- Understanding the Common Mobile Use Approaches in Enterprises
1
Videos
- Understanding the Common Mobile Use Approaches in Enterprises
Understand the Security Risk and Guidelines Associated with Enterprises Mobile Usage Policies
1
Assignment
- Understand the Security Risk and Guidelines Associated with Enterprises Mobile Usage Policies
1
Videos
- Understand the Security Risk and Guidelines Associated with Enterprises Mobile Usage Policies
Understanding Enterprise-level Mobile Security Management Solutions
1
Assignment
- Understanding Enterprise-level Mobile Security Management Solutions
1
Videos
- Understanding Enterprise-level Mobile Security Management Solutions
Understanding the General Security Guidelines and Best Practices for Mobile Platforms
2
Assignment
- Understanding the General Security Guidelines and Best Practices for Mobile Platforms
- Mobile Device Security
1
Videos
- Understanding the General Security Guidelines and Best Practices for Mobile Platforms
Module Introduction
1
Videos
- Introduction
Understanding the IoT and Why Organizations Opt for IoT-enabled Environments
1
Assignment
- Understanding the IoT and Why Organizations Opt for IoT-enabled Environments
1
Videos
- Understanding the IoT and Why Organizations Opt for IoT-enabled Environments
Overview of IoT Application Areas and IoT Devices
1
Assignment
- Overview of IoT Application Areas and IoT Devices
1
Videos
- Overview of IoT Application Areas and IoT Devices
Understanding the IoT Architecture and IoT Communication Models
1
Assignment
- Understanding the IoT Architecture and IoT Communication Models
1
Videos
- Understanding the IoT Architecture and IoT Communication Models
Understanding the Security in IoT-Enabled Environments
1
Assignment
- Understanding the Security in IoT-Enabled Environments
1
Videos
- Understanding the Security in IoT-Enabled Environments
Understanding the Security Considerations of the IoT Framework
1
Assignment
- Understanding the Security Considerations of the IoT Framework
1
Videos
- Understanding the Security Considerations of the IoT Framework
Overview of IoT Device Management
1
Assignment
- Overview of IoT Device Management
1
Videos
- Overview of IoT Device Management
Understanding the Best Practices and Tools for IoT Security
2
Assignment
- Understanding the Best Practices and Tools for IoT Security
- IoT Device Security
1
Videos
- Understanding the Best Practices and Tools for IoT Security
Module Introduction
1
Videos
- Introduction
Understanding Cryptographic Techniques
1
Assignment
- Understanding Cryptographic Techniques
1
Videos
- Understanding Cryptographic Techniques
Understanding the Different Encryption Algorithms
1
Assignment
- Understanding the Different Encryption Algorithms
1
Videos
- Understanding the Different Encryption Algorithms
Understanding the Different Hashing Algorithms
1
Assignment
- Understanding the Different Hashing Algorithms
1
Videos
- Understanding the Different Hashing Algorithms
Overview of Different Cryptography Tools and Hash Calculators
1
Assignment
- Overview of Different Cryptography Tools and Hash Calculators
1
Videos
- Overview of Different Cryptography Tools and Hash Calculators
Understanding Public Key Infrastructure (PKI), Digital Signatures and Digital Certificates
2
Assignment
- Understanding Public Key Infrastructure (PKI), Digital Signatures and Digital Certificates
- Cryptography and PKI
1
Videos
- Understanding Public Key Infrastructure (PKI), Digital Signatures and Digital Certificates
Module Introduction
1
Videos
- Introduction
Understanding Data Security and its Importance
1
Assignment
- Understanding Data Security and its Importance
1
Videos
- Understanding Data Security and its Importance
Understanding the Different Data Security Technologies
1
Assignment
- Understanding the Different Data Security Technologies
1
Videos
- Understanding the Different Data Security Technologies
Understanding the Various Security Controls for Data Encryption
1
Assignment
- Video 11.4: Quiz
1
Videos
- Video 11.4: Understanding the Various Security Controls for Data Encryption
Overview of Disk Encryption, File Encryption, and Removable-media Encryption Tools
1
Assignment
- Overview of Disk Encryption, File Encryption, and Removable-media Encryption Tools
1
Videos
- Overview of Disk Encryption, File Encryption, and Removable-media Encryption Tools
Understanding the Methods and Tools for Data Backup and Retention
1
Assignment
- Understanding the Methods and Tools for Data Backup and Retention
1
Videos
- Understanding the Methods and Tools for Data Backup and Retention
Understanding the Data Loss Prevention (DLP) and DLP Solutions
2
Assignment
- Understanding the Data Loss Prevention (DLP) and DLP Solutions
- Data Security
1
Videos
- Understanding the Data Loss Prevention (DLP) and DLP Solutions
Module Introduction
1
Videos
- Introduction
Understanding the Need for and Advantages of Network Traffic Monitoring
1
Assignment
- Understanding the Need for and Advantages of Network Traffic Monitoring
1
Videos
- Understanding the Need for and Advantages of Network Traffic Monitoring
Understanding the Network Traffic Signatures
1
Assignment
- Understanding the Network Traffic Signatures
1
Videos
- Understanding the Network Traffic Signatures
Understanding the Categories of Suspicious Traffic Signatures
1
Assignment
- Understanding the Categories of Suspicious Traffic Signatures
1
Videos
- Understanding the Categories of Suspicious Traffic Signatures
Overview of Attack Signature Analysis Techniques
1
Assignment
- Overview of Attack Signature Analysis Techniques
1
Videos
- Overview of Attack Signature Analysis Techniques
Understanding Network Monitoring for Suspicious Traffic
1
Assignment
- Understanding Network Monitoring for Suspicious Traffic
1
Videos
- Understanding Network Monitoring for Suspicious Traffic
Overview of Various Network Monitoring Tools
2
Assignment
- Overview of Various Network Monitoring Tools
- Network Traffic Monitoring
1
Videos
- Overview of Various Network Monitoring Tools
Auto Summary
Network Defense Essentials (NDE) is an introductory cybersecurity course designed for entry-level careers in information security. Offered by Coursera, it covers key concepts like Identification, Authentication, Cloud Computing, and Data Security. With interactive labs, learners gain practical experience. The NDE certification enhances resumes, showcasing expertise to employers. Ideal for aspiring cybersecurity professionals, the course has a 1860-hour duration and offers a Starter subscription.

EC-Council