Network Security & Database Vulnerabilities

  • 4.6
Approx. 14 hours to complete

Course Summary

Learn how to identify and prevent database vulnerabilities and network security threats in this comprehensive course. Gain hands-on experience in network security, database security, and cryptography to enhance your cybersecurity skills.

Key Learning Points

  • Understand the principles of network security and cryptography
  • Identify and prevent database vulnerabilities
  • Gain hands-on experience in network and database security
  • Learn about different types of network attacks
  • Explore potential security threats and how to mitigate them

Related Topics for further study


Learning Outcomes

  • Identify and prevent network and database vulnerabilities
  • Understand and implement cryptography principles
  • Gain hands-on experience in network and database security

Prerequisites or good to have knowledge before taking this course

  • Basic understanding of computer networks and databases
  • Familiarity with cybersecurity concepts

Course Difficulty Level

Intermediate

Course Format

  • Online self-paced course
  • Video lectures
  • Hands-on exercises
  • Quizzes and assessments

Similar Courses

  • Cybersecurity: Developing a Program for Critical Infrastructure
  • Applied Cryptography
  • Introduction to Cybersecurity

Related Books

Description

This course gives you the background needed to understand basic network security. You will learn the about Local Area Networks, TCP/IP, the OSI Framework and routing basics. You will learn how networking affects security systems within an organization. You will learn the network components that guard an organization from cybersecurity attacks.

Knowledge

  • Understand network basics around the TCP/IP and OSI Models.
  • Recount DNS, DHCP, Switching and Routing concepts.
  • Understand IP Addressing, Network Address Translation and Packet Sniffing.
  • Describe the structures and vulnerabilities of key databases for cybersecurity including SQL, Couch, Oracle and MongoDB.

Outline

  • TCP/IP Framework
  • Welcome to the Course: Network Security & Database Vulnerabilities
  • Welcome to Introduction to TCP/IP Framework
  • Stateless Inspection
  • Stateful Inspection
  • Firewall Filters- IDS and IPS Systems
  • The Difference between IDS and IPS Systems
  • Network Address Translation
  • An Introduction to Local Area Networks
  • Ethernet and LAN - Ethernet Operations
  • Ethernet and LAN - Network Devices
  • Introduction to Basic Network Routing
  • Layer 2 and Layer 3 Network Addressing
  • Address Resolution Protocol
  • Routers and Routing Tables, Part 1
  • Routers and Routing Tables, Part 2
  • Routers and Routing Tables, Part 3
  • Earn an IBM digital badge
  • About this course
  • Research of Network Vendor Training
  • Introduction to the TCP/IP Protocol Framework
  • Network Protocols over Ethernet and Local Area Networks
  • Basics of Routing and Switching, Network Packets and Structures
  • TCP/IP Framework
  • Basics of IP Addressing and the OSI Model
  • Welcome to the Basics of IP Addressing and the OSI Model
  • IP Addressing - The Basics of Binary
  • IP Address Structure and Network Classes
  • IP Protocol and Traffic Routing
  • Introduction to the IPv6 Address Schema
  • Application and Transport Protocols UDP and TCP, Part 1
  • Application and Transport Protocols UDP and TCP, Part 2
  • DNS and DHCP
  • Syslog Message Logging Protocol
  • Flows and Network Analysis
  • Port Mirroring and Promiscuous Mode
  • Next Generation Firewalls - Overview
  • NGFW and the OSI Model
  • NGFW Packet Flow Example and NGFW Comparisons
  • Intrusion Detection and Intrusion Prevention Systems
  • High Availability and Clustering
  • Basics of IP Addressing
  • TCP/IP Layer 4, Transport Layer Overview
  • TCP/IP Layer 5, Application Layer Overview
  • Firewalls, Intrusion Detection and Intrusion Prevention Systems
  • Clustering and High Availability Systems
  • Basics of IP Addressing and the OSI Model
  • Introduction to Databases
  • Welcome to Introduction to Databases
  • Data Source Types Part 1
  • Data Source Types Part 2
  • Data Model Types
  • Structured Data
  • Securing the Crown Jewels
  • Leveraging Security Industry Best Practices
  • Structured Data and Relational Databases
  • Anatomy of a Vulnerability Assessment Test Report
  • Securing Data Sources by Type
  • Securing Databases Wrap Up
  • Data Monitoring
  • Data Alerts
  • Data Activity Reporting
  • Attributes to Include in Logging
  • Failed Access Monitoring
  • Suspicious Access Events, Part 1
  • Suspicious Access Events, Part 2
  • Data Breach Feeds
  • Types of Data
  • Securing Databases
  • A Data Protection Solution Example, IBM Security Guardium Use Cases
  • Introduction to Databases
  • Deep Dive - Injection Vulnerability
  • Welcome to Deep Dive - Injection Vulnerability
  • Introduction to Injection Flaws
  • OS Command Injection Part 1
  • OS Command Injection Part 2
  • OS Command Injection Part 3
  • SQL Injection Part 1
  • SQL Injection Part 2
  • Other Types of Injection
  • Thank you for attending this course
  • Additional Resources
  • Injection Vulnerability
  • SQL Injection
  • Deep Dive - Injection Vulnerability

Summary of User Reviews

Discover the latest network security and database vulnerabilities with this course on Coursera. Students have praised the comprehensive coverage of the materials and the engaging instructors. Overall, the course has received positive reviews from users.

Key Aspect Users Liked About This Course

The course offers a comprehensive coverage of network security and database vulnerabilities.

Pros from User Reviews

  • The instructors are engaging and knowledgeable.
  • The course offers hands-on experience with real-world scenarios.
  • The course materials are well-organized and easy to follow.
  • The course provides valuable knowledge for professionals in the field.
  • The course offers a good balance between theory and practice.

Cons from User Reviews

  • Some users found the course too basic and not challenging enough.
  • The course requires a significant time commitment.
  • Some users found the course too technical and difficult to follow.
  • The course materials need to be updated to reflect the latest trends.
  • Some users found the course too expensive.
English
Available now
Approx. 14 hours to complete
IBM Security Learning Services
IBM
Coursera

Instructor

Share
Saved Course list
Cancel
Get Course Update
Computer Courses