- Level Foundation
- Duration 16 hours
- Course by Kennesaw State University
-
Offered by
About
Almost every organization uses computer networks to share their information and to support their business operations. When we allow network access to data it is exposed to threats from inside and outside of the organization. This course examines the threats associated with using internal and external networks and how to manage the protection of information when it’s accessible via networks. In this course, a learner will be able to: ● Describe the threats to data from information communication technology (ICT) ● Identify the issues and practices associated with managing network security ● Identify the practices, tools, and methodologies associated with assessing network security ● Describe the components of an effective network security programModules
Welcome to the course Managing Network Security
1
Videos
- Welcome to the course Managing Network Security
2
Readings
- Managing Network Security
- Get help and meet other learners. Join your Community!
Welcome to Introduction to Networking
1
Videos
- Introduction to Networking
What is a network? (Lesson 3.1.1)
1
Assignment
- What is a network?
1
Videos
- What is a network?
How networks communicate (Lesson 3.1.2)
1
Assignment
- How networks communicate
1
Videos
- How networks communicate
Introduction to Network Protocols (Lesson 3.1.3)
1
Assignment
- Introduction to Network Protocols
1
Videos
- Introduction to Network Protocols
TCP/IP and Ethernet Network Protocols (Lesson 3.1.4)
1
Assignment
- TCP/IP and Ethernet Network Protocols
1
Videos
- TCP/IP and Ethernet Network Protocols
Securing Internet Services and the Web - Part 1 (Lesson 3.1.5)
1
Assignment
- Securing Internet Services and the Web - Part 1
1
Videos
- Securing Internet Services and the Web - Part 1
Securing Internet Services and the Web - Part 2 (Lesson 3.1.6)
1
Assignment
- Securing Internet Services and the Web - Part 2
1
Videos
- Securing Internet Services and the Web - Part 2
Wrap up for Introduction to Networking
1
Assignment
- Introduction to Networking
1
Videos
- Introduction to Networking
Welcome
1
Videos
- Cybersecurity Technology Administration
1
Readings
- Firewalls
Firewall Administration – Firewall Selection (Lesson 3.2.1)
1
Assignment
- Firewall Administration – Firewall Selection
1
Videos
- Firewall Administration – Firewall Selection
Firewall Administration – Firewall Configuration (Lesson 3.2.2)
1
Assignment
- Firewall Administration – Firewall Configuration
1
Videos
- Firewall Administration – Firewall Configuration
IDPS Administration (Lesson 3.2.3)
1
Assignment
- IDPS Administration
1
Videos
- IDPS Administration
VPN Administration (Lesson 3.2.4)
1
Assignment
- VPN Administration
1
Videos
- VPN Administration
Cryptography and Network Security (Lesson 3.2.5)
1
Assignment
- Cryptography and Network Security
1
Videos
- Cryptography and Network Security
Wrap up for module Cybersecurity Technology Administration
1
Assignment
- Cybersecurity Technology Administration
1
Videos
- Cybersecurity Technology Administration
Welcome for Wireless and Cloud Networks
1
Videos
- Wireless and Cloud Networks
1
Readings
- Wireless Protocols
What is a Wireless Network? (Lesson 3.3.1)
1
Assignment
- What is a Wireless Network?
1
Videos
- What is a Wireless Network?
Wireless Standards and Protocols (Lesson 3.3.2)
1
Assignment
- Wireless Standards and Protocols
1
Videos
- Wireless Standards and Protocols
What is Cloud networking and computing? (Lesson 3.3.3)
1
Assignment
- What is Cloud networking and computing?
1
Videos
- What is Cloud networking and computing?
Cloud networking and cybersecurity (Lesson 3.3.4)
1
Assignment
- Cloud networking and cybersecurity
1
Videos
- Cloud networking and cybersecurity
Additional Wireless Network Standards and Technologies (Lesson 3.3.5)
1
Assignment
- Additional Wireless Network Standards and Technologies
1
Videos
- Additional Wireless Network Standards and Technologies
Wrap up for Wireless and Cloud Networks
1
Assignment
- Wireless and Cloud Networks
1
Videos
- Wrap up for Wireless and Cloud Networks
Welcome to Cybersecurity Network Auditing, Monitoring and Logging
1
Videos
- Cybersecurity Network Auditing, Monitoring and Logging
1
Readings
- Managing Digital Forensics
Introduction to Auditing and Systems Monitoring (Lesson 3.4.1)
1
Assignment
- Introduction to Auditing and Systems Monitoring
1
Videos
- Introduction to Auditing and Systems Monitoring
Auditing & Systems Monitoring Management – Part 1 (Lesson 3.4.2)
1
Assignment
- Auditing & Systems Monitoring Management – Part 1
1
Videos
- Auditing & Systems Monitoring Management – Part 1
Auditing & Systems Monitoring Management – Part 2 (Lesson 3.4.3)
1
Assignment
- Auditing & Systems Monitoring Management – Part 2
1
Videos
- Auditing & Systems Monitoring Management – Part 2
Formal Audits & Auditing (Lesson 3.4.4)
1
Assignment
- Formal Audits & Auditing
1
Videos
- Formal Audits & Auditing
Digital Forensics & Auditing – Part 1 (Lesson 3.4.5)
1
Assignment
- Digital Forensics & Auditing – Part 1
1
Videos
- Digital Forensics & Auditing – Part 1
Digital Forensics & Auditing – Part 2 (Lesson 3.4.6)
1
Assignment
- Digital Forensics & Auditing – Part 2
1
Videos
- Digital Forensics & Auditing – Part 2
Wrap up
1
Assignment
- Managing Network Security
1
Videos
- Wrap up for Cybersecurity Network Auditing, Monitoring and Logging
Wrap up for the course Managing Network Security
1
Assignment
- Managing Network Security Course Examination
1
Videos
- Wrap up for the course Managing Network Security
Auto Summary
"Managing Network Security" is an essential course within the IT & Computer Science domain, designed to equip learners with the knowledge and skills needed to safeguard organizational data shared over computer networks. This foundational course, offered by Coursera, delves into the various threats posed by information communication technology (ICT), covering both internal and external risks. Throughout its comprehensive 960-minute duration, participants will gain insights into the key issues and practices for managing network security. They will learn to identify and implement effective tools and methodologies for assessing security, and understand the critical components of a robust network security program. Ideal for those at the beginning of their network security journey, the course caters to a broad audience, from IT professionals looking to enhance their security acumen to individuals seeking to safeguard their organizations. Flexible subscription options, including Starter and Professional tiers, ensure learners can access the content that best fits their needs. Join this course to build a strong foundation in network security and protect your organization's valuable information from potential threats.

Herbert J. Mattord, Ph.D., CISM, CISSP, CDP

Michael Whitman, Ph.D., CISM, CISSP