When you enroll in this course, you'll also be enrolled in this Professional Certificate.
Learn new concepts from industry experts
Gain a foundational understanding of a subject or tool
Develop job-relevant skills with hands-on projects
Earn a shareable career certificate from Google
There are 4 modules in this course
This course provides a brief introduction to network architecture, operations, intrusion tactics, and security hardening. Learners will also be introduced to common network protocols and how systems use the TCP/IP model to communicate within a network. Learners will gain an understanding of network level vulnerabilities and how to secure a network against those vulnerabilities. Network security topics will include firewalls, virtual private networks (VPNs), system hardening, and virtual private networks.
By the end of this course, you will:
- Describe the structure of different computer networks.
- Illustrate how data is sent and received over a network.
- Recognize common network protocols.
- Identify common network security measures and protocols.
- Explain how to secure a network against intrusion tactics.
- Compare and contrast local networks to cloud computing.
- Explain the different types of system hardening techniques.
This module provides learners with an understanding of network architecture and mechanisms to secure the network. The module also introduces network security and explains how it relates to ongoing security threats and vulnerabilities.
What's included
13 videos8 readings4 assignments2 plugins
Show info about module content
13 videos•Total 26 minutes
Introduction to Course 3•1 minute
Welcome to module 1 •1 minute
Chris: My path to cybersecurity•3 minutes
What are networks?•2 minutes
Tina: Working in network security•2 minutes
Emmanuel: Useful skills for network security•3 minutes
Network tools•3 minutes
Cloud networks •2 minutes
Introduction to network communication•2 minutes
The TCP/IP model•2 minutes
The four layers of the TCP/IP model •2 minutes
IP addresses and network communication•2 minutes
Wrap-up•1 minute
8 readings•Total 44 minutes
Course 3 overview•4 minutes
Helpful resources and tips•4 minutes
Network components, devices, and diagrams•4 minutes
Cloud computing and software-defined networks•8 minutes
Learn more about the TCP/IP model•8 minutes
The OSI model •8 minutes
Components of network layer communication•4 minutes
Glossary terms from module 1 •4 minutes
4 assignments•Total 76 minutes
Test your knowledge: Introduction to networks•8 minutes
Test your knowledge: Network communication•10 minutes
Test your knowledge: Local and wide network communication•8 minutes
Module challenge 1•50 minutes
2 plugins•Total 20 minutes
Practice: Design a local area network•10 minutes
Identify: Functions of network tools•10 minutes
Network operations
Module 2•2 hours to complete
Module details
This module explores the network tools, protocols, and techniques that govern the functioning of network systems. Communication takes place on a network and that communication can introduce vulnerabilities to the network. Learners will understand protocols that regulate network communication and be introduced to the tools and concepts that play a major role in ensuring network operations are safe and reliable.
What's included
9 videos7 readings3 assignments
Show info about module content
9 videos•Total 22 minutes
Welcome to module 2•1 minute
Network protocols•3 minutes
Antara: Working in network security •3 minutes
Wireless protocols•1 minute
Firewalls and network security measures•4 minutes
Virtual private networks (VPNs)•2 minutes
Security zones•3 minutes
Proxy servers•3 minutes
Wrap-up•1 minute
7 readings•Total 28 minutes
Common network protocols •4 minutes
Additional network protocols •4 minutes
The evolution of wireless security protocols•4 minutes
Subnetting and CIDR•4 minutes
Virtual networks and privacy•4 minutes
VPN protocols: Wireguard and IPSec•4 minutes
Glossary terms from module 2•4 minutes
3 assignments•Total 68 minutes
Test your knowledge: Recognize different network protocols•8 minutes
Test your knowledge: System identification •10 minutes
Module challenge 2•50 minutes
Secure against network intrusions
Module 3•3 hours to complete
Module details
In this section of the course, learners will explore different types of network attacks and various tactics used to secure compromised network systems and devices. Malicious actors employ a variety of methods to exploit vulnerabilities in network infrastructure and this requires security professionals to always stay aware of potential loopholes. Being aware of all the ways that networks are targeted is an important skill for a cybersecurity analyst.
What's included
7 videos7 readings5 assignments1 plugin
Show info about module content
7 videos•Total 18 minutes
Welcome to module 3 •0 minutes
The case for securing networks •1 minute
Matt: A professional on dealing with attacks•3 minutes
Test your knowledge: Secure networks against Denial of Service (DoS) attacks•10 minutes
Activity: Analyze network attacks•50 minutes
Test your knowledge: Network interception attack tactics•8 minutes
Module challenge 3•50 minutes
1 plugin•Total 10 minutes
Identify: Network attacks•10 minutes
Security hardening
Module 4•3 hours to complete
Module details
In this section of the course, learners will familiarize themselves with network hardening practices that strengthen network systems over time. Security professionals work against experiencing numerous security breaches, which is why it is important to take preliminary security measures to remain one step ahead of attackers. Malicious actors are constantly evolving in their intrusion methods and network security hardening is a defensive strategy that aims to prevent or lessen the chances of future attacks taking place. Security hardening also involves securing applications over cloud systems and addressing the unique security challenges posed by cloud infrastructures.
What's included
8 videos11 readings7 assignments
Show info about module content
8 videos•Total 20 minutes
Welcome to module 4 •1 minute
Security hardening•3 minutes
OS hardening practices•4 minutes
Network hardening practices •4 minutes
Network security in the cloud •2 minutes
Kelsey: Cloud security explained•3 minutes
Wrap-up •1 minute
Course wrap-up •2 minutes
11 readings•Total 46 minutes
Brute force attacks and OS hardening•4 minutes
Activity Exemplar: Apply OS hardening techniques•4 minutes
Network security applications•12 minutes
Activity Exemplar: Analysis of network hardening•4 minutes
Secure the cloud•4 minutes
Cryptography and cloud security•4 minutes
Glossary terms from module 4 •2 minutes
Portfolio Activity Exemplar: Use the NIST Cybersecurity Framework to respond to a security incident•4 minutes
Reflect and connect with peers•2 minutes
Course 3 glossary •2 minutes
Get started on the next course •4 minutes
7 assignments•Total 140 minutes
Activity: Apply OS hardening techniques•30 minutes
Test your knowledge: OS hardening •10 minutes
Activity: Analysis of network hardening•0 minutes
Test your knowledge: Network hardening •10 minutes
Test your knowledge: Cloud hardening •10 minutes
Module 4 challenge•50 minutes
Portfolio activity: Use the NIST cybersecurity framework to respond to a security incident•30 minutes
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.
Instructor
Instructor ratings
Instructor ratings
We asked all learners to give feedback on our instructors based on the quality of their teaching style.
Grow with Google is an initiative that draws on Google's decades-long history of building products, platforms, and services that help people and businesses grow. We aim to help everyone – those who make up the workforce of today and the students who will drive the workforce of tomorrow – access the best of Google’s training and tools to grow their skills, careers, and businesses.
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."
Jennifer J.
Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."
Larry W.
Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."
Chaitanya A.
"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."
Learner reviews
4.8
7,225 reviews
5 stars
85.73%
4 stars
11.41%
3 stars
1.93%
2 stars
0.55%
1 star
0.35%
Showing 3 of 7225
M
MP
5·
Reviewed on Dec 16, 2023
Like guiding through network and security elements ... fast. Challenging and rich in content but not going into too deep. The following courses in the certificate will delve deeper, I imagine.
S
SD
5·
Reviewed on Oct 13, 2024
it was amazing and all the concepts were simply explained . thank uh coursera for making it easier for me to understand these new topics to me in such a convient and simplified way
D
DZ
4·
Reviewed on Sep 24, 2023
I had to do this while sick and injured...BRUTAL. But this course WILL teach you the working skills of it. Just make sure to know how to set up your computer when you go to work and you're good.
When will I have access to the lectures and assignments?
To access the course materials, assignments and to earn a Certificate, you will need to purchase the Certificate experience when you enroll in a course. You can try a Free Trial instead, or apply for Financial Aid. The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.
What will I get if I subscribe to this Certificate?
When you enroll in the course, you get access to all of the courses in the Certificate, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile.