This course introduces real-time cyber security techniques and methods in the context of the TCP/IP protocol suites. Explanation of some basic TCP/IP security hacks is used to introduce the need for network security solutions such as stateless and stateful firewalls. Learners will be introduced to the techniques used to design and configure firewall solutions such as packet filters and proxies to protect enterprise assets.
About this Course
- 5 stars78.55%
- 4 stars19.09%
- 3 stars1.80%
- 1 star0.54%
TOP REVIEWS FROM REAL-TIME CYBER THREAT DETECTION AND MITIGATION
i think it was an excellent and very helpful cousre and a big thankyou for the instructor for his hardwork
Explained in simple language, which make the concepts easy to understand
Good additional resources & case studies to make foundation strong
Explains the basics but still very well and made it simple to understand, I would recommend the staff to check some things that where also commented in the forum
I am not an engineer but this course is interesting. I have learned so much about cyber security. I am about to start the last course in this progaram.
About the Introduction to Cyber Security Specialization
Frequently Asked Questions
When will I have access to the lectures and assignments?
What will I get if I subscribe to this Specialization?
Is financial aid available?
More questions? Visit the Learner Help Center.