Computer Networks and Network Security

Coursera Courses ↗ · Coursera

Open Course on Coursera

Free to audit · Opens on Coursera

Computer Networks and Network Security

Coursera · Intermediate ·🔐 Cybersecurity ·1mo ago
The US Bureau of Labor Statistics forecasts a 32% growth in information security analyst jobs until 2032. These analysts are in demand as part of the team that keeps networks secure.    This course provides practical hands-on computer networking and network security experience that employers want. Through innovative hands-on labs, you'll learn how to secure a small home office network (SOHO), install and configure DHCP, and filter DNS. You’ll also get real-world practice installing and using an open-source Extended Detection and Response (XDR) system.    Additionally, you’ll build valuable supporting knowledge of ports, protocols, and IP addresses, including IPv6 and network routing. You’ll learn about Layer 2 and 3 addressing, routers, and routing tables.   Plus, you’ll develop knowledge of cybersecurity analyst tools for data protection, endpoint protection, and SIEM, which you can apply to an organization’s compliance and threat intelligence needs, which is crucial in today’s cybersecurity landscape.  You’ll complete a final project where you will demonstrate your ability to perform network and security planning tasks.  Networking and network security skills pay. Invest in yourself and enroll today! 
Watch on Coursera ↗ (saves to browser)
Sign in to unlock AI tutor explanation · ⚡30

Related AI Lessons

Stop Blindly Disabling CSRF — Dynamic CSRF Configuration in Spring Security 6
Learn to dynamically configure CSRF protection in Spring Security 6 for hybrid enterprise APIs, replacing global disable strategies
Medium · Cybersecurity
Microsoft Reveals Kazuar Malware’s Advanced Modular Design and Peer-to-Peer Botnet Capabilities
Microsoft reveals Kazuar malware's advanced modular design and peer-to-peer botnet capabilities, posing a significant threat to cybersecurity
Medium · Cybersecurity
The OpenAI Breach Wasn't About OpenAI – It Was About the 84 Packages Above Them
The OpenAI breach highlights the importance of securing dependencies in the software supply chain, affecting 84 packages above them
Dev.to · Dimitris Kyrkos
Years of Apple's Best Security Work, Cracked in Five Days — Here's What Developers Should Know
Apple's best security measures were cracked in five days, highlighting the importance of ongoing security efforts for developers
Dev.to · ArshTechPro
Up next
How do I restrict access of IAM Identities to specific Amazon EC2 resources?
Amazon Web Services
Watch →