Managing Network Security

  • 4.7
Approx. 15 hours to complete

Course Summary

Learn how to manage network cybersecurity and protect your organization from cyber attacks with this course. Gain practical skills and knowledge to implement cybersecurity protocols and strategies.

Key Learning Points

  • Understand the importance of cybersecurity in network management
  • Learn key cybersecurity concepts and strategies
  • Implement cybersecurity protocols to protect your organization
  • Explore emerging cybersecurity trends and technologies
  • Gain practical skills through hands-on assignments and projects

Related Topics for further study


Learning Outcomes

  • Understand the importance of cybersecurity in network management
  • Implement cybersecurity protocols to protect your organization
  • Gain practical skills through hands-on assignments and projects

Prerequisites or good to have knowledge before taking this course

  • Basic knowledge of computer networks
  • Familiarity with cybersecurity concepts

Course Difficulty Level

Intermediate

Course Format

  • Online self-paced
  • Interactive
  • Hands-on assignments and projects

Similar Courses

  • Cybersecurity Fundamentals
  • Introduction to Network Security

Related Education Paths


Notable People in This Field

  • Cybersecurity Expert
  • Director of Cybersecurity

Related Books

Description

Almost every organization uses computer networks to share their information and to support their business operations. When we allow network access to data it is exposed to threats from inside and outside of the organization. This course examines the threats associated with using internal and external networks and how to manage the protection of information when it’s accessible via networks.

Knowledge

  • Describe the threats to data from information communication technology (ICT)
  • Identify the issues and practices associated with managing network security
  • Identify the practices, tools, and methodologies associated with assessing network security
  • Describe the components of an effective network security program

Outline

  • Welcome to the course Managing Network Security (Course 3)
  • Welcome to the course Managing Network Security
  • Managing Network Security
  • Introduction to Networking (Module 3.1)
  • Introduction to Networking
  • What is a network?
  • How networks communicate
  • Introduction to Network Protocols
  • TCP/IP and Ethernet Network Protocols
  • Securing Internet Services and the Web - Part 1
  • Securing Internet Services and the Web - Part 2
  • Introduction to Networking
  • What is a network?
  • How networks communicate
  • Introduction to Network Protocols
  • TCP/IP and Ethernet Network Protocols
  • Securing Internet Services and the Web - Part 1
  • Securing Internet Services and the Web - Part 2
  • Introduction to Networking
  • Cybersecurity Technology Administration (Module 3.2)
  • Cybersecurity Technology Administration
  • Firewall Administration – Firewall Selection
  • Firewall Administration – Firewall Configuration
  • IDPS Administration
  • VPN Administration
  • Cryptography and Network Security
  • Cybersecurity Technology Administration
  • Firewalls
  • Firewall Administration – Firewall Selection
  • Firewall Administration – Firewall Configuration
  • IDPS Administration
  • VPN Administration
  • Cryptography and Network Security
  • Cybersecurity Technology Administration
  • Wireless and Cloud Networks (Module 3.3)
  • Wireless and Cloud Networks
  • What is a Wireless Network?
  • Wireless Standards and Protocols
  • What is Cloud networking and computing?
  • Cloud networking and cybersecurity
  • Additional Wireless Network Standards and Technologies
  • Wrap up for Wireless and Cloud Networks
  • Wireless Protocols
  • What is a Wireless Network?
  • Wireless Standards and Protocols
  • What is Cloud networking and computing?
  • Cloud networking and cybersecurity
  • Additional Wireless Network Standards and Technologies
  • Wireless and Cloud Networks
  • Cybersecurity Network Auditing, Monitoring and Logging (Module 3.4)
  • Cybersecurity Network Auditing, Monitoring and Logging
  • Introduction to Auditing and Systems Monitoring
  • Auditing & Systems Monitoring Management – Part 1
  • Auditing & Systems Monitoring Management – Part 2
  • Formal Audits & Auditing
  • Digital Forensics & Auditing – Part 1
  • Digital Forensics & Auditing – Part 2
  • Wrap up for Cybersecurity Network Auditing, Monitoring and Logging
  • Managing Digital Forensics
  • Introduction to Auditing and Systems Monitoring
  • Auditing & Systems Monitoring Management – Part 1
  • Auditing & Systems Monitoring Management – Part 2
  • Formal Audits & Auditing
  • Digital Forensics & Auditing – Part 1
  • Digital Forensics & Auditing – Part 2
  • Managing Network Security
  • Wrap up for Managing Network Security
  • Wrap up for the course Managing Network Security
  • Managing Network Security Course Examination

Summary of User Reviews

Learn how to manage network cybersecurity with this comprehensive course. Users praise the course for its practical approach and real-world examples.

Pros from User Reviews

  • The course provides practical and relevant information.
  • The instructors are knowledgeable and engaging.
  • The course is well-structured and easy to follow.
  • The course covers a wide range of cybersecurity topics.
  • The course provides hands-on exercises for better understanding.

Cons from User Reviews

  • Some users found the course content to be too basic.
  • The course does not provide enough depth for advanced learners.
  • The course may not be suitable for those with a strong technical background.
  • The course may be too time-consuming for some learners.
  • The course may not be suitable for those with limited cybersecurity knowledge.
English
Available now
Approx. 15 hours to complete
Herbert J. Mattord, Ph.D., CISM, CISSP, CDP, Michael Whitman, Ph.D., CISM, CISSP
University System of Georgia
Coursera
Share
Saved Course list
Cancel
Get Course Update
Computer Courses