Network Security

Jonathan S. Weissman, RITx

Learn the process of network security, including intrusion detection, evidence collection, network auditing, and contingency planning against attacks.

In this course, you will examine the various areas of network security including intrusion detection, evidence collection and defense against cyber attacks.

The issues and facilities available to both the intruder and data network administrator will also be examined to illustrate their effect.

You will learn the principles and concepts of wired and wireless data network security. You will be guided through a series of laboratories and experiments in order to explore various mechanisms for securing data networks including physical layer mechanisms, filters, applications and encryption.

You will analyze attack/defend scenarios and determine the effectiveness of particular defense deployments against attacks.

This course is a part of the RITx Cybersecurity MicroMasters Program.

What will you learn

  • How to identify when attacks are happening inside networks
  • How to collect evidence of network intrusions
  • How to test networks and systems for vulnerabilities
  • How to prepare for and defend against network attacks

Dates:
  • 6 August 2019
Course properties:
  • Free:
  • Paid:
  • Certificate:
  • MOOC:
  • Video:
  • Audio:
  • Email-course:
  • Language: English Gb

Reviews

No reviews yet. Want to be the first?

Register to leave a review

More on this topic:
52cbad0b-c721-4e3d-babd-e63201fd6a57-852443175864.small Resume, Networking, and Interview Skills
Get the job you want with compelling resume writing and focused interview preparation...
Aea32c0b-0d17-4ead-8996-a880b32aa433-529ba46a886d.small Cybersecurity and Privacy in the IoT
Learn about the security and privacy implications of the IoT and how to design...
Regular_10232247-5f42-483f-86db-d139b29e8cca Basics of Network Security
Explore the basic concepts of networks and network security and the tools used...
Efc25613-f0ea-4423-bfcd-4d94c317f085-d26c7107a1f7.small Tech for Good: The Role of ICT in Achieving the SDGs
What opportunities and challenges do digital technologies present for the development...
153cedc6-d710-41c4-bd39-58363ef0f7db-83132d4d2059.small Cyber Security Basics: A Hands-on Approach
Learn how to think like a hacker, but behave as a security expert. Are you tired...
More from 'Computer Science':
910f3ce1-1ffb-4bc1-99ff-86f8d5471851-b0689ff3dc8a.small Data Structures and Software Design
Learn how to select, apply, and analyze the most appropriate data representations...
4d3258fc-bcee-4c37-bf7a-9f22524bf4a7-ee314bada985.small Human-Computer Interaction I: Fundamentals & Design Principles
Learn the principles of Human-Computer Interaction to create intuitive, usable...
7138aabb-44bc-41c1-97ec-bca2ea95f5dc-c33778a8a76f.small Human-Computer Interaction II: Cognition, Context & Culture
Get into the user’s mind and understand the role of mental models and...
8a795319-4243-4956-af0d-f23ea93d8a2a-94dacb9a8f04.small Human-Computer Interaction III: Ethics, Needfinding & Prototyping
Build on your knowledge of HCI’s core principles by learning to design...
D72cb271-b1ed-4881-bc87-dbcc16708307-f3d481dad153.small Human-Computer Interaction IV: Evaluation, Agile Methods & Beyond
Complete your understand of the design life cycle by learning to take interface...
More from 'edX':
910f3ce1-1ffb-4bc1-99ff-86f8d5471851-b0689ff3dc8a.small Data Structures and Software Design
Learn how to select, apply, and analyze the most appropriate data representations...
F8a1a729-7f5f-45d4-b131-350cd4e20fa3-a2c9fd1bb762.small 知识产权法律及实务|Big Data and Intellectual Property Law and Practice
懂得在中国如何运用和保护知识产权,为迎接知识经济时代的全球竞争做好准备。Understand how to use and protect intellectual...
4d3258fc-bcee-4c37-bf7a-9f22524bf4a7-ee314bada985.small Human-Computer Interaction I: Fundamentals & Design Principles
Learn the principles of Human-Computer Interaction to create intuitive, usable...
7138aabb-44bc-41c1-97ec-bca2ea95f5dc-c33778a8a76f.small Human-Computer Interaction II: Cognition, Context & Culture
Get into the user’s mind and understand the role of mental models and...
8a795319-4243-4956-af0d-f23ea93d8a2a-94dacb9a8f04.small Human-Computer Interaction III: Ethics, Needfinding & Prototyping
Build on your knowledge of HCI’s core principles by learning to design...

© 2013-2019