What You Need to Know Before
You Start

Starts 20 June 2025 16:21

Ends 20 June 2025

00 days
00 hours
00 minutes
00 seconds
course image

Network and Communications Security

Network and Communications Security Welcome to course five: Network and Communication Security. The explosive growth in networks and connectivity has transformed business, personal, and government services into electronic, web-enabled forms. This growth has significantly expanded the threat surface, allowing fraudsters, criminals, unscrupulous bu.
via Coursera

2039 Courses


Not Specified

Optional upgrade avallable

All Levels

Progress at your own speed

Free

Optional upgrade avallable

Overview

Welcome to course five:

Network and Communication Security. The explosive growth in networks and connectivity has transformed business, personal, and government services into electronic, web-enabled forms.

This growth has significantly expanded the threat surface, allowing fraudsters, criminals, unscrupulous business competitors, nation states, and non-nation-state actors to take harmful actions worldwide.

For decades, the world has operated on a network monoculture utilizing protocols and standards to power most of the internet, e-commerce, and e-business. These standards include the Open Systems Interconnection (OSI) seven-layer model from the International Organization for Standardization and the Transmission Control Protocol over Internet Protocol (TCP/IP) model from the Internet Engineering Task Force.

Almost every laptop, smart device, and endpoint uses these standards to communicate with servers, applications, businesses, and governments. Hence, these models become our map of the threat surface.

Security professionals must have a solid grasp of modern network concepts, techniques, technologies, and security issues.

Their role is akin to police patrols, requiring familiarity with the network's environment and the best practices for securing it against attacks. This policing mentality is crucial, especially for companies with limited or no remote visibility into their operational technology systems.

In this course:

  • Module 1:

    Start with a brief orientation to the network neighborhood via the OSI and TCP/IP models.

    Dive into all eight layers of this combined protocol stack, introducing key technologies at each layer.

  • Module 2:

    Explore the various protocols running on top of this architecture.

  • Module 3:

    Focus on attack and defensive strategies, putting threat surface analysis into both attackers and defenders' operational contexts.

  • Module 4:

    Integrate these concepts into a network security management and monitoring perspective.

Course 5 Learning Objectives:

  • L5.1 - Recognize layers of the OSI model, their functions, and potential attacks at each layer.
  • L5.2 - Identify commonly used ports and protocols.
  • L5.3 - Select appropriate countermeasures for various network attacks.
  • L5.4 - Summarize best practices for establishing a secure networked environment.

Course Agenda:

  • Module 1:

    Apply the Fundamental Concepts of Networking (Domain 6 - Network and Communications Security)

  • Module 2:

    Securing Ports and Protocols (Domain 6 - Network and Communications Security)

  • Module 3:

    Network Attacks and Countermeasures (Domain 6 - Network and Communications Security)

  • Module 4:

    Manage Network Security (Domain 6 - Network and Communications Security)

Who Should Take This Course:

Beginners. No prior experience is required.

University:

Provider:

Coursera

Categories:

  • Cybersecurity Courses
  • Network Security Courses
  • Virtualization Courses


Subjects