Master the fundamental protocols and technologies that power the modern internet with this comprehensive TCP/IP and Internet course. Designed for aspiring network professionals and IT specialists, this course takes you through the complete networking stack—from physical layer transmission to application layer protocols. You'll gain hands-on experience with transport protocols like TCP and UDP, explore network layer routing and IP addressing, and understand how data securely traverses the internet infrastructure. Through practical examples and real-world scenarios, you'll learn network architecture design, multimedia transmission, wireless networking, and essential security protocols. This course bridges theoretical computer networking concepts with practical implementation skills, preparing you to design, deploy, troubleshoot, and secure modern network systems across enterprise and cloud environments. Whether you're pursuing a career in network engineering, cybersecurity, or cloud computing, this course provides the foundational knowledge needed to excel in today's interconnected digital landscape.

noch 5 Tage: Holen Sie sich einen Black Friday Boost mit $160 Rabatt auf 10.000+ Programme.Sparen Sie jetzt.


Empfohlene Erfahrung
Was Sie lernen werden
Understand TCP/IP architecture, protocols, and layered networking principles, ensuring efficient and secure communication.
Analyse packet transmission, routing, congestion control, and network security challenges for optimised data flow.
Gain hands-on experience with Wireshark for packet analysis and develop network applications using socket programming.
Design, configure, and troubleshoot enterprise networks while applying security protocols to protect real-world systems.
Kompetenzen, die Sie erwerben
- Kategorie: Network Security
- Kategorie: Network Architecture
- Kategorie: Computer Networking
- Kategorie: Software-Defined Networking
- Kategorie: Wireless Networks
- Kategorie: Computer Security Awareness Training
- Kategorie: Network Model
- Kategorie: Network Protocols
- Kategorie: Network Routing
- Kategorie: OSI Models
- Kategorie: Application Security
- Kategorie: Network Performance Management
- Kategorie: TCP/IP
- Kategorie: Network Infrastructure
- Kategorie: Routing Protocols
Wichtige Details

Zu Ihrem LinkedIn-Profil hinzufĂĽgen
November 2025
Erfahren Sie, wie Mitarbeiter fĂĽhrender Unternehmen gefragte Kompetenzen erwerben.

In diesem Kurs gibt es 10 Module
In this module, we get an overview of current computer networks and the internet, their evolution and their uses, before getting to know what a protocol is and why we need it in the context of a network. With a basic understanding of what a network and a protocol are, we then focus on learning the involvement of different entities, like the edge, access networks, and the core side. We then move on to learn the key characteristics which influence the network performance, including throughput and delay at various network entities. We conclude the module by describing the layered architecture by taking the Open Systems Interconnections (OSI) and TCP/IP models of layers and comparing them.
Das ist alles enthalten
17 Videos15 LektĂĽren15 Aufgaben
In this module, we discuss the key principles of network applications, including client-server architecture and comparing it with peer-peer architecture, processes in the scope of an application, and creating network application programs with the help of a socket interface. We then move on to know what is World Wide Web (WWW), before learning the key application layer protocol behind the working of today’s Internet. i.e., HTTP in depth. Further, we will discuss the Domain Name System (DNS) in detail, including its role in today’s internet, its working in two different flavours, records, and messages used for DNS services. We conclude the module by describing what is Email, its message components, and which protocols have made today’s Email work realistically.
Das ist alles enthalten
16 Videos15 LektĂĽren16 Aufgaben
In this module, we discuss the working of major transport layer protocols namely, User Datagram Protocol (UDP) and Transport Control Protocol (TCP) in detail. At first, the multiplexing and demultiplexing of UDP and TCP are detailed with the help of their respective header formats. Next, the working of reliable data transfer and functioning of flow control in TCP are described in detail before presenting its connection management where TCP’s connection establishment and termination process are explained. The module then brings in the principles of congestion control and explains the different approaches by TCP for congestion control. Finally, the module concludes by comparing the UDP and TCP applications by discussing their respective pros and cons.
Das ist alles enthalten
20 Videos19 LektĂĽren19 Aufgaben
This module focuses on introducing the network layer by defining the services provided by this layer and discussing packet switching, including the datagram approach and network-layer performance. Then we'll look into the details of Internet Protocol version 4 (IPv4), including addressing, packet format, options, ICMPv4, mobile IP and then finally IP version 6.
Das ist alles enthalten
16 Videos15 LektĂĽren17 Aufgaben
This module focuses on understanding how a router has a forwarding table to forward a packet to the appropriate next node on its way to the final destination or destinations. To make the forwarding tables of the router, the Internet needs routing protocols that will be active all the time in the background and update the forwarding tables. We’ll look into the details of the network layer decomposed into two interacting parts, the data plane and the control plane. We then move on to learn the concept of Multicasting and the SDN approach.
Das ist alles enthalten
14 Videos14 LektĂĽren16 Aufgaben
This module focuses on understanding how different integrated media, such as text, images, audio, and video, are generated, stored, and transmitted digitally and can be accessed interactively. The module covers subjects that are, directly or indirectly, related to multimedia, such as compression and digitising multimedia data. Then we'll look into the details of multimedia protocols and protocols for real-time conversational applications.
Das ist alles enthalten
13 Videos12 LektĂĽren14 Aufgaben
In this module, we learn the role and functioning of the link layer. Precisely, how the link layer contributes to error detection and correction of data, three different mechanisms of coordinating the multiple access problem at the link layer and finally the working of Ethernet, the most widely used LAN technology.
Das ist alles enthalten
19 Videos18 LektĂĽren20 Aufgaben
This module focuses on understanding how data and signals can be both analogue and digital along with their characteristics. Concentrate on how to convert digital data to digital signals and then convert analogue data to digital signals. Covers on multiplexing to benefit more from the bandwidth available. Then will discuss the transmission media that are used in data communication along with wireless and mobile networks.
Das ist alles enthalten
13 Videos12 LektĂĽren14 Aufgaben
In this module, we understand the network management in depth. Specifically, we learn the key functionalities of network management including Fault, Configuration, Accounting, Performance, and Security (FCAPS) management aspects. Once the key functions are studied, we move on to learn the workings of Simple Network Management Protocol (SNMP) in depth. Here, we focus on understanding SNMP framework, operations, and its significance in network monitoring and management. We conclude the module, by learning the role of NETCONF and YANG in the overall.
Das ist alles enthalten
17 Videos16 LektĂĽren18 Aufgaben
In this module, we first discuss the key principles of securing network applications before moving on to know what Transport Layer Security (TLS) is and its contribution to securing HTTP applications. Precisely, we will learn the working of TLS with respect to connection establishment, handshaking, key derivation and safe data transfer. We conclude the module by understanding how the security of Email communication is achieved, and also the role of firewalls and Intrusion Detection Systems (IDS) in aiding operational security.
Das ist alles enthalten
16 Videos16 LektĂĽren17 Aufgaben
Dozent

Mehr von Computer Security and Networks entdecken
Status: Kostenloser Testzeitraum
Status: VorschauYonsei University
Status: Kostenloser TestzeitraumUniversity of Colorado System
Status: Kostenloser Testzeitraum
Warum entscheiden sich Menschen fĂĽr Coursera fĂĽr ihre Karriere?





Neue Karrieremöglichkeiten mit Coursera Plus
Unbegrenzter Zugang zu 10,000+ Weltklasse-Kursen, praktischen Projekten und berufsqualifizierenden Zertifikatsprogrammen - alles in Ihrem Abonnement enthalten
Bringen Sie Ihre Karriere mit einem Online-Abschluss voran.
Erwerben Sie einen Abschluss von erstklassigen Universitäten – 100 % online
SchlieĂźen Sie sich mehr als 3.400Â Unternehmen in aller Welt an, die sich fĂĽr Coursera for Business entschieden haben.
Schulen Sie Ihre Mitarbeiter*innen, um sich in der digitalen Wirtschaft zu behaupten.
Häufig gestellte Fragen
To access the course materials, assignments and to earn a Certificate, you will need to purchase the Certificate experience when you enroll in a course. You can try a Free Trial instead, or apply for Financial Aid. The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.
When you enroll in the course, you get access to all of the courses in the Specialization, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile.
Yes. In select learning programs, you can apply for financial aid or a scholarship if you can’t afford the enrollment fee. If fin aid or scholarship is available for your learning program selection, you’ll find a link to apply on the description page.
Weitere Fragen
Finanzielle UnterstĂĽtzung verfĂĽgbar,
Âą Einige Aufgaben in diesem Kurs werden mit AI bewertet. FĂĽr diese Aufgaben werden Ihre Daten in Ăśbereinstimmung mit Datenschutzhinweis von Courseraverwendet.

