- Level Foundation
- Duration 15 hours
-
Offered by
About
This course gives you the background needed to understand basic network security. You will learn the about Local Area Networks, TCP/IP, the OSI Framework and routing basics. You will learn how networking affects security systems within an organization. You will learn the network components that guard an organization from cybersecurity attacks. In addition to networking, you will learn about database vulnerabilities and the tools/knowledge needed to research a database vulnerability for a variety of databases including SQL Injection, Oracle, Mongo and Couch. You will learn about various security breach types associated with databases and organizations that define standards and provide tools for cybersecurity professionals. This course is intended for anyone who wants to gain a basic understanding of Network Security/Database Vulnerabilities or as the fourth course in a series of courses to acquire the skills to work in the Cybersecurity field as a Jr Cybersecurity Analyst.Modules
Welcome to the Course
1
Videos
- Course Introduction
1
Readings
- Course Overview
Networking Fundamentals
1
Assignment
- Practice Quiz: Networking Fundamentals
1
External Tool
- Lab: Exploring Networking Ports and Protocols
4
Videos
- Computer Networks: Networking Hardware Devices
- Models, Standards, Protocols, and Ports
- Computer Networks: Wireless Networks and Standards
- Protocol Table
1
Readings
- Summary & Highlights
Summary, Glossary, and Graded Quiz
1
Assignment
- Graded Quiz: Networking Fundamentals
1
Discussions
- [Optional] Design a network structure for the future
1
Readings
- Summary: Networking Fundamentals
Basics of IP Addressing
1
Assignment
- Practice Quiz: Basics of IP Addressing
4
Videos
- IP Addressing - The Basics of Binary
- IP Address Structure and Network Classes
- IP Protocol and Traffic Routing
- Introduction to the IPv6 Address Schema
Basics of Routing and Switching
1
Assignment
- Practice Quiz: Basics of Routing and Switching
6
Videos
- Basics of Network Routing
- Layer 2 and Layer 3 Addressing
- Address Resolution Protocol
- Routers and Routing Tables, Part 1
- Routers and Routing Tables, Part 2
- Routers and Routing Tables, Part 3
Summary, Glossary, and Graded Quiz
1
Assignment
- Graded Quiz: IP Addressing, Routing and Switching
1
Readings
- Summary: IP Addressing, Routing and Switching
Transport Layer Overview
1
Assignment
- Practice Quiz: Transport Layer Overview
2
Videos
- Application and Transport Protocols, Part 1
- Application and Transport Protocols, Part 2
Application Layer Overview
1
Assignment
- Practice Quiz: Application Layer Overview
2
External Tool
- Lab: Installing and Configuring DHCP
- Lab: DNS Filtering
6
Videos
- DNS and DHCP
- DNS Filtering
- Syslog Message Logging Protocol
- Flows and Network Analysis
- Port Mirroring and Promiscuous Mode
- User Behavior Analysis
Summary, Glossary, and Graded Quiz
1
Assignment
- Graded Quiz: Network Protocols
1
Discussions
- [Optional] Securing a High-Profile Corporate Network
1
Readings
- Summary: Network Protocols
Firewalls, Intrusion Detection Systems, and Intrusion Prevention Systems
1
Assignment
- Practice quiz: Firewall, IDS, and IPS
4
External Tool
- [Optional] Lab: Protocols and Ports in Windows Defender
- Hands-on Lab: Windows Firewall with Advanced Security
- Lab: Configuring Firewalls in Microsoft Windows
- Lab: Intrusion Detection System Activity
6
Videos
- Stateless Inspection
- Stateful Inspection
- Firewall Filters with Intrusion Systems
- Using Your Microsoft Windows Lab Workspace
- Intrusion Detection and Prevention Systems Compared
- Network Address Translation
Network Access Control, Endpoint Detection and Response, and Extended Detection and Response
1
Assignment
- Practice Quiz: Network Access Control, EDR, and XDR
5
Videos
- File Integrity Monitoring
- Data Loss Prevention (DLP)
- Network Access Control (NAC)
- Endpoint Detection and Response (EDR)
- Extended Detection and Response
Summary, Glossary, and Graded Quiz
1
Assignment
- Graded Quiz: Network Security Techniques
1
Readings
- Summary: Network Security Techniques
Final Project
1
External Tool
- Final Project: Network Design and Security Configuration
1
Peer Review
- Peer-Graded Final Assignment
1
Readings
- Final Project Overview
Course Wrap-Up
1
Videos
- Course Summary
2
Readings
- Congratulations and Next Steps
- Thanks from the Course Team
Auto Summary
Unlock the essentials of network security and database vulnerabilities with this comprehensive course designed for aspiring cybersecurity professionals. Delve into the fundamentals of Local Area Networks, TCP/IP, the OSI Framework, and routing, while understanding the critical role networking plays in safeguarding organizational security systems. This course also covers the identification and mitigation of database vulnerabilities, including SQL Injection, Oracle, Mongo, and Couch databases. Led by Coursera, this foundational course spans approximately 900 minutes and is perfect for beginners or those looking to complete a series of courses to become a Jr Cybersecurity Analyst. Gain the skills to recognize various security breach types and explore the standards and tools provided by leading cybersecurity organizations. Flexible subscription options are available with the Starter plan, making it easier to begin your journey into the cybersecurity domain. Whether you're starting from scratch or seeking to solidify your understanding, this course offers invaluable insights and practical knowledge to enhance your expertise in network security and database vulnerabilities.