Securing the Network

Coursera Courses ↗ · Coursera

Open Course on Coursera

Free to audit · Opens on Coursera

Securing the Network

Coursera · Intermediate ·🔐 Cybersecurity ·8h ago
This course is dedicated to network security, one of the most comprehensive chapters in the curriculum. Covering approximately 3 hours of expert instruction, learners develop a solid understanding of how to design, implement, and operate a secure network infrastructure. Learners benefit by gaining knowledge of network security zones, firewall architecture, network access control, intrusion detection and prevention, VPN technologies, and network monitoring and hardening techniques. Online labs reinforce firewall configuration, VPN setup, and network security monitoring tasks. This course directly covers the Security Architecture and Security Operations domains of the exam. By the end of this course, learners will be able to design and implement secure network architectures and apply monitoring and response techniques to defend enterprise networks.
Watch on Coursera ↗ (saves to browser)
Sign in to unlock AI tutor explanation · ⚡30

Related AI Lessons

The Secure One Is Silent: Kerberos Stays Quiet, NTLM Tells
Learn how NTLM packets can be used in analysis processes for cybersecurity, and why Kerberos stays quiet in comparison
Medium · Cybersecurity
Reclaiming the Narrative: How “Hire a Hacker Pro” Built an Immutable Blueprint for Enterprise…
Learn how 'Hire a Hacker Pro' created an immutable blueprint for enterprise cybersecurity, and why it matters for businesses today
Medium · Cybersecurity
How Cybersecurity Threats Can Affect Business Computers
Learn how cybersecurity threats can impact business computers and why protecting them is crucial
Medium · Cybersecurity
️ Shift-Left Security: La Seguridad no es una Meta, es el Camino️
Learn how Shift-Left Security integrates security into every stage of the development process, making it a crucial part of the journey, not just a final goal
Medium · Cybersecurity
Up next
VPC Service Controls: Day Two Operations
Google Cloud
Watch →