This course introduces real-time cyber security techniques and methods in the context of the TCP/IP protocol suites. Explanation of some basic TCP/IP security hacks is used to introduce the need for network security solutions such as stateless and stateful firewalls. Learners will be introduced to the techniques used to design and configure firewall solutions such as packet filters and proxies to protect enterprise assets.
This course is part of the Introduction to Cyber Security Specialization
About this Course
Syllabus - What you will learn from this course
Basic Network Security
More Advanced Network Security Technologies
Network Security Architectures
Enterprise Network Security
- 5 stars78.54%
- 4 stars19.03%
- 3 stars1.73%
- 1 star0.69%
TOP REVIEWS FROM REAL-TIME CYBER THREAT DETECTION AND MITIGATION
Good material. Some lectures may be padded with lengthy (unneeded)
Very good course providing basic knowledge for understanding the ways of cyber threat detections & mitigation so it is easier and more intuitive continuing exploration of the field by your own
Technical terms described in a meaningful ways and examples were very effective to grasp the impact and importance of cybersecurity.
Good course, very solid foundation of basics in the topic. Having said that, even discussion forums are pretty much abandoned, with a few lonely posters and almost no activity there.
About the Introduction to Cyber Security Specialization
Frequently Asked Questions
When will I have access to the lectures and assignments?
What will I get if I subscribe to this Specialization?
Is financial aid available?
More questions? Visit the Learner Help Center.