Connect and Protect: Networks and Network Security

Coursera Courses ↗ · Coursera

Open Course on Coursera

Free to audit · Opens on Coursera

Connect and Protect: Networks and Network Security

Coursera · Beginner ·🔐 Cybersecurity ·1mo ago
This course provides a brief introduction to network architecture, operations, intrusion tactics, and security hardening. Learners will also be introduced to common network protocols and how systems use the TCP/IP model to communicate within a network. Learners will gain an understanding of network level vulnerabilities and how to secure a network against those vulnerabilities. Network security topics will include firewalls, virtual private networks (VPNs), system hardening, and virtual private networks. By the end of this course, you will: - Describe the structure of different computer networks. - Illustrate how data is sent and received over a network. - Recognize common network protocols. - Identify common network security measures and protocols. - Explain how to secure a network against intrusion tactics. - Compare and contrast local networks to cloud computing. - Explain the different types of system hardening techniques.
Watch on Coursera ↗ (saves to browser)
Sign in to unlock AI tutor explanation · ⚡30

Related AI Lessons

Twitter OSINT & Threat Intelligence: Toolkit for Ethical Hackers & Security Analysts
Use Twitter for OSINT and threat intelligence to enhance security posture ethically and effectively
Medium · Startup
Twitter OSINT & Threat Intelligence: Toolkit for Ethical Hackers & Security Analysts
Learn to leverage Twitter for OSINT and threat intelligence to strengthen security posture
Medium · Cybersecurity
Your Encrypted Laptop Isn’t as Safe as You Think
Encryption alone may not protect your laptop data from theft, understand the limitations and take additional measures
Medium · Cybersecurity
TCP, Firewalls, Port Forwarding & VPNs — How Data Is Sent and Secured
Learn how data is sent and secured over the internet using TCP, firewalls, port forwarding, and VPNs
Medium · Cybersecurity
Up next
Cryptography
Coursera
Watch →