Network and Communications Security

Coursera Courses ↗ · Coursera

Open Course on Coursera

Free to audit · Opens on Coursera

Network and Communications Security

Coursera · Beginner ·🔐 Cybersecurity ·1mo ago
Course 6 - Network and Communications Security This is the sixth course under the specialization SSCP. This course includes an orientation to the network neighborhood via the OSI 7-Layer and TCP/IP models in the context of internetworking and communications. It also probes each of the seven layers of this combined protocol stack, introducing the key technologies at each layer and their normal uses. There is also information on various protocols that run on top of this architecture, as well as attack and defensive strategies and tactics. Additionally, discussed in this course is how to manage network security and secure wireless communications. Course 6 Learning Objectives After completing this course, the participant will be able to:  - Recognize layers of the OSI model, their functions and attacks present at each layer, and identify commonly used ports and protocols. - Select appropriate security controls for various network attacks. - Describe the tools used for network access control. - Summarize best practices for establishing a secure networked environment. - Understand how to configure and operate security devices such as firewalls and proxies. - Summarize the types of telecommunications and network access controls. Who Should Take This Course: Beginners Experience Required: No prior experience required
Watch on Coursera ↗ (saves to browser)
Sign in to unlock AI tutor explanation · ⚡30

Related AI Lessons

The Hidden Risk in Emergency Evacuation Plans Nobody Talks About
Organizations struggle to identify who is inside their buildings during emergencies, posing a hidden risk in evacuation plans
Medium · Cybersecurity
3 Key Takeaways on Why Cybersecurity Product Management Matters More Than Ever
Cybersecurity product management is crucial for building trust in digital products, learn how to prioritize security in product design
Medium · Cybersecurity
The Coding Challenge That Came for Your development Directory: Anatomy of a Job Interview Infostealer
Learn to identify and protect against malicious coding challenges that can steal sensitive information from your development directory
Dev.to · Alex Chen
I Watched an AI Hack a Home Network in Under 10 Minutes
Learn how AI hacking tools can break into home routers in under 10 minutes and why cybersecurity is crucial
Medium · Cybersecurity
Up next
How do I delete recovery points under a legal hold or in a locked backup vault for AWS Backup?
Amazon Web Services
Watch →