Network and Communications Security

via Coursera

Coursera

1449 Courses


course image

Overview

Welcome to course five: Network and Communication Security. The explosive growth in networks and connectivity has transformed business, personal, and government services into electronic, web-enabled forms. This growth has significantly expanded the threat surface, allowing fraudsters, criminals, unscrupulous business competitors, nation states, and non-nation-state actors to take harmful actions worldwide.

For decades, the world has operated on a network monoculture utilizing protocols and standards to power most of the internet, e-commerce, and e-business. These standards include the Open Systems Interconnection (OSI) seven-layer model from the International Organization for Standardization and the Transmission Control Protocol over Internet Protocol (TCP/IP) model from the Internet Engineering Task Force. Almost every laptop, smart device, and endpoint uses these standards to communicate with servers, applications, businesses, and governments. Hence, these models become our map of the threat surface.

Security professionals must have a solid grasp of modern network concepts, techniques, technologies, and security issues. Their role is akin to police patrols, requiring familiarity with the network's environment and the best practices for securing it against attacks. This policing mentality is crucial, especially for companies with limited or no remote visibility into their operational technology systems.

In this course:

  • Module 1: Start with a brief orientation to the network neighborhood via the OSI and TCP/IP models. Dive into all eight layers of this combined protocol stack, introducing key technologies at each layer.
  • Module 2: Explore the various protocols running on top of this architecture.
  • Module 3: Focus on attack and defensive strategies, putting threat surface analysis into both attackers and defenders' operational contexts.
  • Module 4: Integrate these concepts into a network security management and monitoring perspective.

Course 5 Learning Objectives:

  • L5.1 - Recognize layers of the OSI model, their functions, and potential attacks at each layer.
  • L5.2 - Identify commonly used ports and protocols.
  • L5.3 - Select appropriate countermeasures for various network attacks.
  • L5.4 - Summarize best practices for establishing a secure networked environment.

Course Agenda:

  • Module 1: Apply the Fundamental Concepts of Networking (Domain 6 - Network and Communications Security)
  • Module 2: Securing Ports and Protocols (Domain 6 - Network and Communications Security)
  • Module 3: Network Attacks and Countermeasures (Domain 6 - Network and Communications Security)
  • Module 4: Manage Network Security (Domain 6 - Network and Communications Security)

Who Should Take This Course:

Beginners. No prior experience is required.

University:

Provider: Coursera

Categories:

  • Cybersecurity Courses
  • Network Security Courses
  • Virtualization Courses

Syllabus


Taught by


Tags

united states