Computer Networks: Implementation & Security

Coursera Courses ↗ · Coursera

Open Course on Coursera

Free to audit · Opens on Coursera

Computer Networks: Implementation & Security

Coursera · Intermediate ·🔐 Cybersecurity ·3d ago
Master modern computer networking and build the skills required to design, implement, and troubleshoot secure network systems. Learn how real-world networks operate and how to manage them effectively. This course provides a structured journey through networking fundamentals and advanced concepts. You will start with core principles such as the OSI model, TCP/IP communication, and subnetting, building a strong foundation in how networks function. You will then explore network infrastructure, including VLANs, DHCP, NAT, DNS, wireless technologies, and virtualization. The course also covers physical networking and WAN technologies, helping you understand how enterprise networks are designed and maintained. A strong focus is placed on network security and business continuity, including access control, threat detection, and disaster recovery strategies. You will also learn structured troubleshooting techniques and diagnostic tools to resolve real-world network issues. By the end of the course, you will be able to confidently analyze, implement, and troubleshoot modern network systems, preparing you for networking and IT infrastructure roles.
Watch on Coursera ↗ (saves to browser)
Sign in to unlock AI tutor explanation · ⚡30

Related AI Lessons

How the 2025 “CWE Top 25 Most Dangerous Software Weaknesses” List was Built
Learn how the 2025 CWE Top 25 Most Dangerous Software Weaknesses list was built to improve cybersecurity
Medium · Cybersecurity
Fortinet & Palo Alto ile Multi-Vendor IPSec VPN Yapılandırması
Learn to configure a multi-vendor IPSec VPN setup between Fortinet and Palo Alto for enhanced security
Medium · Cybersecurity
The SLA Credit Scam: What 99.9% vs 99.99% Uptime Actually Means
Learn the true meaning of 99.9% vs 99.99% uptime in SLAs and how it affects server downtime and security risks
Medium · Cybersecurity
Attack of the Dark Ghost of Nonce Reuse: A critical Bitcoin vulnerability and recovery of private…
Learn about a critical Bitcoin vulnerability caused by nonce reuse and its potential recovery methods
Medium · Machine Learning
Up next
Data Management and Privacy Practices for Professionals
Coursera
Watch →