Introduction to Network Security

Coursera Courses ↗ · Coursera

Open Course on Coursera

Free to audit · Opens on Coursera

Introduction to Network Security

Coursera · Beginner ·🔐 Cybersecurity ·1mo ago
The security of computer networks is a key element in cyber security. Computer networking provides the foundational connectivity services that are used for the world wide web, distributed computer applications and services, operations and manufacturing, and national infrastructure. This course provides understanding of key technologies used in computer networks and infrastructure. This includes protocols, computer networks, data centres, operational technologies that form key infrastructure critical to the success of organisations and services from a local to an international scale. The course discusses vulnerabilities and the exploits that target computer networks, systems, and the Internet infrastructure. By the end of this course learners will be able to: 1. Show a systematic understanding of digital networks and their operation, including the OSI 7 layer architecture and the TCP/IP protocol stack. 2. Discuss key security threats and risks faced in computer networks. 3. Demonstrate a critical understanding of network security architecture and design rationale of selected protocols, security technologies and how they are used in practice. 4. Identify attack models and analyse vulnerabilities in protocols, network systems, and applications. 5. Demonstrate how these vulnerabilities may be exploited in practice to penetrate a system.
Watch on Coursera ↗ (saves to browser)
Sign in to unlock AI tutor explanation · ⚡30

Related AI Lessons

Six Trust Boundaries Between Your React App and the Next Compromise
Learn how to establish trust boundaries between your React app and external dependencies to prevent security compromises
Medium · JavaScript
Six Trust Boundaries Between Your React App and the Next Compromise
Learn to secure your React app from supply-chain attacks with 6 trust boundaries after the TanStack npm package compromise
Medium · DevOps
Six Trust Boundaries Between Your React App and the Next Compromise
Learn to secure your React app from supply-chain attacks with six trust boundaries after the TanStack npm package compromise
Medium · Cybersecurity
I Built a 10-Phase Attack Surface Recon Framework from Scratch — Here’s Everything I Learned
Learn how to build a 10-phase attack surface recon framework from scratch using Node.js and React, and improve your cybersecurity skills
Medium · Cybersecurity
Up next
Technology-Specific Secure Coding: Languages and Frameworks
Coursera
Watch →