Almost every organization uses computer networks to share their information and to support their business operations. When we allow network access to data it is exposed to threats from inside and outside of the organization. This course examines the threats associated with using internal and external networks and how to manage the protection of information when it’s accessible via networks.
This course is part of the Managing Cybersecurity Specialization
About this Course
What you will learn
Describe the threats to data from information communication technology (ICT)
Identify the issues and practices associated with managing network security
Identify the practices, tools, and methodologies associated with assessing network security
Describe the components of an effective network security program
Skills you will gain
- Wireless Security
- Intrusion Detection System
- Firewall (Computing)
- Computer Network
Syllabus - What you will learn from this course
Welcome to the course Managing Network Security (Course 3)
Introduction to Networking (Module 3.1)
Cybersecurity Technology Administration (Module 3.2)
Wireless and Cloud Networks (Module 3.3)
- 5 stars81.86%
- 4 stars13.47%
- 3 stars3.62%
- 1 star1.03%
TOP REVIEWS FROM MANAGING NETWORK SECURITY
I will recommend this course for all biginners. Because the instructors give detailed expalnation. Thanks to the two Professors.
I believe there is problem at the final quiz since two of the questions does not accept the correct answers as correct. Questions 1 and 30.
The course that I attended is an exelent one. This sessions helped me to learn more about cyber security
A fairly good job of covering all the different topics that fall under Network Security with out getting too complicated
About the Managing Cybersecurity Specialization
Frequently Asked Questions
When will I have access to the lectures and assignments?
What will I get if I subscribe to this Specialization?
Is financial aid available?
More questions? Visit the Learner Help Center.