- Level Foundation
- المدة 12 ساعات hours
- الطبع بواسطة ISC2
-
Offered by
عن
If you are an associate-level cybersecurity analyst who is working in security operation centers, this course will provide introduction to network infrastructure and network security monitoring tools. By the end of the course, you will be able to: •Describe ACL operation when using the established option • Describe the purpose of Access List Control lists •Describe network address translation (NAT) fundamental concepts • Explain the NSM tools that are available to the network security analyst • Describe the three types of NSM tools used within the SOC (commercial, Open Source, or homegrown) • Describe network-based malware protection • Describe the benefits of load balancing and web application firewalls. • Describe AAA • Describe basic models for implementing access controls over network resources. To be successful in this course, you should have the following background: 1. Skills and knowledge equivalent to those learned in Implementing and Administering Cisco Solutions (CCNA) v1.0 course 2. Familiarity with Ethernet and TCP/IP networking 3. Working knowledge of the Windows and Linux operating systems 4. Familiarity with basics of networking security concepts.الوحدات
Course Introduction
1
Videos
- Course Introduction
1
Readings
- Course Agenda
Network Concepts and Models
3
Assignment
- Self Check: Networking Terms and Models
- Self Check: Formatting IPv6
- Self Check: Matching Ports with Their Secure Counterparts
6
Videos
- What is Networking?
- Network Models- Comparison
- Layers 1 and 2 – Physical Layer
- Layer 3 – Network Layer
- Layer 4 – Transport Layer
- Layer 5 – Session Layer
10
Readings
- What is Networking?
- Networking at a Glance
- Networking Models
- Open Systems Interconnection (OSI) Model
- Transmission Control Protocol/Internet Protocol (TCP/IP)
- Internet Protocol (IPv4 and IPv6)
- What is WiFi?
- Security of the Network
- Ports and Protocols (Applications/Services)
- Secure Ports
Common Network Threats and Attacks
1
Assignment
- Self Check: Types of Threats
4
Videos
- Spoofing, Phishing, DOS
- Virus, Worm, Trojans, On-Path Attack
- Side-Channel Attack
- Host Intrusion Prevention Systems
4
Readings
- Types of Threats
- Identify Threats and Tools Used to Prevent Them
- Intrusion Detection System (IDS)
- Preventing Threats
Network Security Infrastructure
3
Assignment
- Self Check: On-Premises
- Self Check: Cloud Service Terminology
- Self Check: Network Design Terms
3
Videos
- Data Center
- Cloud Services
- Infrastructure as a Service (IaaS)
17
Readings
- On-Premises Data Centers
- Redundancy
- Cloud
- Cloud Characteristics
- Service Models
- Deployment Models
- Managed Service Provider (MSP)
- Service-Level Agreement (SLA)
- Network Design
- Defense in Depth
- Zero Trust
- Network Access Control (NAC)
- Network Segmentation (Demilitarized Zone (DMZ))
- Segmentation for Embedded Systems and IoT
- Micro-Segmentation
- Virtual Local Area Network (VLAN)
- Virtual Private Network (VPN)
Network Security Review
1
Assignment
- Network Security Quiz
1
Peer Review
- Peer Review
2
Videos
- Network Security Review
- Network Security Quiz
2
Readings
- Course Summary
- Terms and Definitions
Auto Summary
This foundational course on Network Security, led by Coursera, dives into computer networking and securing networks against threats and attacks. Ideal for IT professionals, students, and career changers, it covers essential concepts, common threats, and security tools over a 720-minute duration. With no prerequisites, learners can subscribe via Starter or Professional options to gain vital cybersecurity skills and prepare for the Certified in Cybersecurity exam.

ISC2 Education & Training