The Network Defense Essentials (NDE) : Hands-On Edition course focuses on network security and defense strategies.

Network Defense Essentials: Hands-On Edition

Network Defense Essentials: Hands-On Edition
This course is part of Information Security Analyst Professional Certificate

Instructor: EC-Council
What you'll learn
Fundamental concepts of network security
Wireless network fundamentals, types of wireless encryption, and security measures
Identification, authentication, and authorization
Cryptography techniques, cryptographic algorithms, and Public Key Infrastructure (PKI)
Skills you'll gain
- Network Security
- Threat Detection
- Internet Of Things
- Encryption
- Cybersecurity
- Data Security
- Security Controls
- Information Assurance
- Wireless Networks
- Intrusion Detection and Prevention
- Authorization (Computing)
- Identity and Access Management
- Network Monitoring
- Cryptography
- Cloud Security
- Authentications
- Public Key Infrastructure
Tools you'll learn
Details to know

Add to your LinkedIn profile
87 assignments
See how employees at top companies are mastering in-demand skills

Build your Security expertise
- Learn new concepts from industry experts
- Gain a foundational understanding of a subject or tool
- Develop job-relevant skills with hands-on projects
- Earn a shareable career certificate from EC-Council

There are 12 modules in this course
With the increase in the usage of emerging technology, it has become increasingly important to secure information and data being processed online. As the Internet and computer networks are continually growing, network security has become a challenging task for organizations. This module provides insight into the network security fundamentals, such as network defense approaches, network security controls, network security protocols, etc.
What's included
8 videos7 assignments
8 videos• Total 82 minutes
- Course Introduction• 15 minutes
- Introduction• 2 minutes
- Understanding the Goals of Network Defense• 14 minutes
- Understanding Information Assurance (IA) Principles• 6 minutes
- Understanding the Benefits and Challenges of Network Defense• 6 minutes
- Overview of Different Types of Network Defense Approaches• 2 minutes
- Understanding the Different Types of Network Security Controls• 9 minutes
- Understanding the Different Network Security Protocols• 28 minutes
7 assignments• Total 80 minutes
- Understanding the Goals of Network Defense• 10 minutes
- Understanding Information Assurance (IA) Principles• 10 minutes
- Understanding the Benefits and Challenges of Network Defense• 10 minutes
- Overview of Different Types of Network Defense Approaches• 10 minutes
- Understanding the Different Types of Network Security Controls• 10 minutes
- Understanding the Different Network Security Protocols• 10 minutes
- Network Security Fundamentals• 20 minutes
The most serious risk that organizations are facing today is unauthorized access to sensitive data. To control such data breaches, organizations require strong identification, authentication, and authorization mechanisms to effectively manage access to critical assets and sensitive data. This module provides an overview of various methods and techniques used for the identification, authentication, and authorization of users accessing critical assets and resources.
What's included
7 videos7 assignments1 app item
7 videos• Total 42 minutes
- Introduction• 2 minutes
- Understanding the Terminology, Principles, and Models of Access Control• 21 minutes
- Understanding Identity and Access Management (IAM)• 5 minutes
- Understanding User Access Management• 3 minutes
- Overview of Different Types of Authentication• 7 minutes
- Overview of Different Types of Authorization• 2 minutes
- Understanding User Accounting• 3 minutes
7 assignments• Total 80 minutes
- Understanding the Terminology, Principles, and Models of Access Control• 10 minutes
- Understanding Identity and Access Management (IAM)• 10 minutes
- Understanding User Access Management• 10 minutes
- Overview of Different Types of Authentication• 10 minutes
- Overview of Different Types of Authorization• 10 minutes
- Understanding User Accounting• 10 minutes
- Identification, Authentication, and Authorization• 20 minutes
1 app item• Total 60 minutes
- Practice Lab• 60 minutes
Compliance, policies, and governance are integral to an information security program for any organization. An organization needs to comply with certain regulatory standards to run its businesses. At the same time, it must also have strong security policies and governance in order to fulfill regulatory standards. The current module addresses this administrative aspect of an organization’s network security.
What's included
7 videos7 assignments1 app item
7 videos• Total 82 minutes
- Introduction• 2 minutes
- Understanding Why Organizations Need Compliance• 15 minutes
- Understanding Various Regulatory Frameworks, Laws, and Acts• 20 minutes
- Understanding the Need for and Characteristics of Good Security Policy• 11 minutes
- Understanding How to Design and Develop Security Policies• 2 minutes
- Overview of Different Types of Security Policies• 9 minutes
- Understanding the Different Types of Security and Awareness Training• 21 minutes
7 assignments• Total 80 minutes
- Understanding Why Organizations Need Compliance• 10 minutes
- Understanding Various Regulatory Frameworks, Laws, and Acts• 10 minutes
- Understanding the Need for and Characteristics of Good Security Policy• 10 minutes
- Understanding How to Design and Develop Security Policies• 10 minutes
- Overview of Different Types of Security Policies• 10 minutes
- Understanding the Different Types of Security and Awareness Training• 10 minutes
- Network Security Controls - Administrative Controls• 20 minutes
1 app item• Total 60 minutes
- Practice Lab• 60 minutes
Physical security plays a major role in every organization. It entails the protection of critical information, network infrastructure, physical equipment and devices, facilities, personnel, etc. from environmental disasters, terrorism, vandalism, and theft. This module explains the importance of physical security, various physical security controls, importance of workplace security, and various environmental controls.
What's included
7 videos7 assignments
7 videos• Total 87 minutes
- Introduction• 2 minutes
- Understanding the Importance of Physical Security• 4 minutes
- Understanding the Physical Security Attack Vectors• 4 minutes
- Understanding the Various Types of Physical Security Controls• 41 minutes
- Understanding the Importance of Workplace Security• 20 minutes
- Overview of Physical Security Policy• 3 minutes
- Understanding the Various Environmental Controls• 13 minutes
7 assignments• Total 80 minutes
- Understanding the Importance of Physical Security• 10 minutes
- Understanding the Physical Security Attack Vectors• 10 minutes
- Understanding the Various Types of Physical Security Controls• 10 minutes
- Understanding the Importance of Workplace Security• 10 minutes
- Overview of Physical Security Policy• 10 minutes
- Understanding the Various Environmental Controls• 10 minutes
- Network Security Controls - Physical Controls• 20 minutes
The most important aspect of security controls is the protection of organizational assets such as people, property, and data. By establishing security controls, an organization can either reduce or completely mitigate risks to their assets. This module provides an overview of various technical controls that help organizations in protecting their private networks and IT assets.
What's included
9 videos9 assignments1 app item
9 videos• Total 195 minutes
- Introduction• 2 minutes
- Understanding Network Segmentation and its Types• 28 minutes
- Understanding the Different Types of Firewalls and their Roles• 45 minutes
- Understanding the Different Types of IDS/IPS and their Roles• 43 minutes
- Overview of Different Types of Honeypots• 6 minutes
- Understanding the Different Types of Proxy Servers and their Benefits• 17 minutes
- Understanding the Fundamentals of Virtual Private Networks (VPNs) and their Importance in Network Security• 38 minutes
- Overview of Security Incident and Event Management (SIEM) and User Behavior Analytics (UBA)• 12 minutes
- Overview of Various Antivirus/Anti-malware Software• 3 minutes
9 assignments• Total 100 minutes
- Understanding Network Segmentation and its Types• 10 minutes
- Understanding the Different Types of Firewalls and their Roles• 10 minutes
- Understanding the Different Types of IDS/IPS and their Roles• 10 minutes
- Overview of Different Types of Honeypots• 10 minutes
- Understanding the Different Types of Proxy Servers and their Benefits• 10 minutes
- Understanding the Fundamentals of Virtual Private Networks (VPNs) and their Importance in Network Security• 10 minutes
- Overview of Security Incident and Event Management (SIEM) and User Behavior Analytics (UBA)• 10 minutes
- Overview of Various Antivirus/Anti-malware Software• 10 minutes
- Network Security Controls - Technical Controls• 20 minutes
1 app item• Total 60 minutes
- Practice Lab• 60 minutes
Cloud computing is an emerging technology that delivers computing services such as online business applications, online data storage, and webmail over the Internet. Cloud implementation enables a distributed workforce, reduces organization expenses, provides data security, etc. This module provides an overview of virtualization and cloud computing concepts that help organizations securely store or process data on the cloud.
What's included
8 videos8 assignments1 app item
8 videos• Total 89 minutes
- Introduction• 1 minute
- Understanding Virtualization, its Components, and Virtualization Enablers• 10 minutes
- Understanding OS Virtualization Security and Concerns• 26 minutes
- Understanding the Best Practices for OS Virtualization Security• 6 minutes
- Understanding Cloud Computing and its Benefits• 5 minutes
- Overview of Different Types of Cloud Computing Services• 5 minutes
- Overview of Cloud Deployment Models• 8 minutes
- Understanding Importance of Cloud Security and its Best Practices• 28 minutes
8 assignments• Total 90 minutes
- Understanding Virtualization, its Components, and Virtualization Enablers• 10 minutes
- Understanding OS Virtualization Security and Concerns• 10 minutes
- Understanding the Best Practices for OS Virtualization Security• 10 minutes
- Understanding Cloud Computing and its Benefits• 10 minutes
- Overview of Different Types of Cloud Computing Services• 10 minutes
- Overview of Cloud Deployment Models• 10 minutes
- Understanding Importance of Cloud Security and its Best Practices• 10 minutes
- Virtualization and Cloud Computing• 20 minutes
1 app item• Total 60 minutes
- Practice Lab• 60 minutes
This module deals with network security for wireless networks in enterprises. Wireless networks are widely used across organizations today and are prone to various attacks. Therefore, organizations need to focus on the planning for securing the wireless network across the organization.
What's included
7 videos7 assignments1 app item
7 videos• Total 54 minutes
- Introduction• 1 minute
- Understanding the Wireless Terminology, Wireless Networks, and Wireless Standards• 16 minutes
- Understanding the Wireless Network Topologies and Classification of Wireless Networks• 5 minutes
- Understanding the Components of a Wireless Network• 6 minutes
- Overview of Wireless Network Encryption Mechanisms• 11 minutes
- Understanding the Different Types of Wireless Network Authentication Methods• 3 minutes
- Understanding Wireless Network Security Measures and Wireless Security Tools• 12 minutes
7 assignments• Total 80 minutes
- Understanding the Wireless Terminology, Wireless Networks, and Wireless Standards• 10 minutes
- Understanding the Wireless Network Topologies and Classification of Wireless Networks• 10 minutes
- Understanding the Components of a Wireless Network• 10 minutes
- Overview of Wireless Network Encryption Mechanisms• 10 minutes
- Understanding the Different Types of Wireless Network Authentication Methods• 10 minutes
- Understanding Wireless Network Security Measures and Wireless Security Tools• 10 minutes
- Wireless Network Security• 20 minutes
1 app item• Total 60 minutes
- Practice Lab• 60 minutes
With the introduction of mobile phones in enterprises, enterprise security has become more complex. Enterprise mobile security has become a major challenge for organizations. Therefore, it is important for organizations to address these security concerns to effectively manage the security of mobile devices. This module provides an overview of mobile device security risks and best practices for mobile platforms.
What's included
7 videos7 assignments1 app item
7 videos• Total 45 minutes
- Introduction• 1 minute
- Understanding the Various Mobile Device Connection Methods• 5 minutes
- Understanding the Concepts of Mobile Device Management• 6 minutes
- Understanding the Common Mobile Use Approaches in Enterprises• 11 minutes
- Understand the Security Risk and Guidelines Associated with Enterprises Mobile Usage Policies• 8 minutes
- Understanding Enterprise-level Mobile Security Management Solutions• 7 minutes
- Understanding the General Security Guidelines and Best Practices for Mobile Platforms• 7 minutes
7 assignments• Total 80 minutes
- Understanding the Various Mobile Device Connection Methods• 10 minutes
- Understanding the Concepts of Mobile Device Management• 10 minutes
- Understanding the Common Mobile Use Approaches in Enterprises• 10 minutes
- Understand the Security Risk and Guidelines Associated with Enterprises Mobile Usage Policies• 10 minutes
- Understanding Enterprise-level Mobile Security Management Solutions• 10 minutes
- Understanding the General Security Guidelines and Best Practices for Mobile Platforms• 10 minutes
- Mobile Device Security• 20 minutes
1 app item• Total 60 minutes
- Practice Lab• 60 minutes
The use of Internet of Things (IoT) devices in enterprise IT infrastructure has created a vast security perimeter. IoT devices use both networks and the cloud. However, they are highly vulnerable to malware, ransomware, and botnet attacks. Attackers can easily compromise IoT endpoints. Understanding the security measures will help in securing IoT-enabled environments. This module provides an overview of IoT device security.
What's included
8 videos8 assignments1 app item
8 videos• Total 47 minutes
- Introduction• 2 minutes
- Understanding the IoT and Why Organizations Opt for IoT-enabled Environments• 7 minutes
- Overview of IoT Application Areas and IoT Devices• 9 minutes
- Understanding the IoT Architecture and IoT Communication Models• 15 minutes
- Understanding the Security in IoT-Enabled Environments• 7 minutes
- Understanding the Security Considerations of the IoT Framework• 2 minutes
- Overview of IoT Device Management• 1 minute
- Understanding the Best Practices and Tools for IoT Security• 4 minutes
8 assignments• Total 90 minutes
- Understanding the IoT and Why Organizations Opt for IoT-enabled Environments• 10 minutes
- Overview of IoT Application Areas and IoT Devices• 10 minutes
- Understanding the IoT Architecture and IoT Communication Models• 10 minutes
- Understanding the Security in IoT-Enabled Environments• 10 minutes
- Understanding the Security Considerations of the IoT Framework• 10 minutes
- Overview of IoT Device Management• 10 minutes
- Understanding the Best Practices and Tools for IoT Security• 10 minutes
- IoT Device Security• 20 minutes
1 app item• Total 60 minutes
- Practice Lab• 60 minutes
Cryptography and cryptographic (“crypto”) systems help in securing data against interception and compromise during online transmissions. This module provides a comprehensive understanding of different cryptosystems and algorithms, one-way hash functions, and public key infrastructures (PKIs). It also covers various tools used to encrypt sensitive data.
What's included
6 videos6 assignments1 app item
6 videos• Total 50 minutes
- Introduction• 1 minute
- Understanding Cryptographic Techniques• 11 minutes
- Understanding the Different Encryption Algorithms• 9 minutes
- Understanding the Different Hashing Algorithms• 7 minutes
- Overview of Different Cryptography Tools and Hash Calculators• 3 minutes
- Understanding Public Key Infrastructure (PKI), Digital Signatures and Digital Certificates• 18 minutes
6 assignments• Total 70 minutes
- Understanding Cryptographic Techniques• 10 minutes
- Understanding the Different Encryption Algorithms• 10 minutes
- Understanding the Different Hashing Algorithms• 10 minutes
- Overview of Different Cryptography Tools and Hash Calculators• 10 minutes
- Understanding Public Key Infrastructure (PKI), Digital Signatures and Digital Certificates• 10 minutes
- Cryptography and PKI• 20 minutes
1 app item• Total 60 minutes
- Practice Lab• 60 minutes
Data breaches can be costly for organizations. Therefore, it is important to keep organization data safe from prying eyes. This module explains the importance of data, and various techniques to protect data.
What's included
7 videos7 assignments1 app item
7 videos• Total 84 minutes
- Introduction• 1 minute
- Understanding Data Security and its Importance• 9 minutes
- Understanding the Different Data Security Technologies• 4 minutes
- Understanding the Various Security Controls for Data Encryption• 3 minutes
- Overview of Disk Encryption, File Encryption, and Removable-media Encryption Tools• 8 minutes
- Understanding the Methods and Tools for Data Backup and Retention• 53 minutes
- Understanding the Data Loss Prevention (DLP) and DLP Solutions• 5 minutes
7 assignments• Total 80 minutes
- Understanding Data Security and its Importance• 10 minutes
- Understanding the Different Data Security Technologies• 10 minutes
- Understanding the Various Security Controls for Data Encryption• 10 minutes
- Overview of Disk Encryption, File Encryption, and Removable-media Encryption Tools• 10 minutes
- Understanding the Methods and Tools for Data Backup and Retention• 10 minutes
- Understanding the Data Loss Prevention (DLP) and DLP Solutions• 10 minutes
- Data Security• 20 minutes
1 app item• Total 60 minutes
- Practice Lab• 60 minutes
Organizations need to perform network monitoring and analyze network traffic to identify suspicious activities across their networks. This module covers the concept of network traffic monitoring.
What's included
7 videos7 assignments2 app items
7 videos• Total 28 minutes
- Introduction• 2 minutes
- Understanding the Need for and Advantages of Network Traffic Monitoring• 4 minutes
- Understanding the Network Traffic Signatures• 4 minutes
- Understanding the Categories of Suspicious Traffic Signatures• 2 minutes
- Overview of Attack Signature Analysis Techniques• 2 minutes
- Understanding Network Monitoring for Suspicious Traffic• 12 minutes
- Overview of Various Network Monitoring Tools• 2 minutes
7 assignments• Total 80 minutes
- Understanding the Need for and Advantages of Network Traffic Monitoring• 10 minutes
- Understanding the Network Traffic Signatures• 10 minutes
- Understanding the Categories of Suspicious Traffic Signatures• 10 minutes
- Overview of Attack Signature Analysis Techniques• 10 minutes
- Understanding Network Monitoring for Suspicious Traffic• 10 minutes
- Overview of Various Network Monitoring Tools• 10 minutes
- Network Traffic Monitoring• 20 minutes
2 app items• Total 120 minutes
- Practice Lab• 60 minutes
- Capstone• 60 minutes
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.
Instructor

Offered by

Offered by

Best known for the Certified Ethical Hacker program, EC-Council builds individual and team/organization cyber capabilities through the Certified Ethical Hacker Program and other programs including Certified Secure Computer User, Computer Hacking Forensic Investigator, Certified Security Analyst, Certified Network Defender, Certified SOC Analyst, Certified Threat Intelligence Analyst, Certified Incident Handler, as well as the Certified Chief Information Security Officer.
Why people choose Coursera for their career

Felipe M.

Jennifer J.

Larry W.

Chaitanya A.
Explore more from Information Technology
EEC-Council
Course
CCisco Learning and Certifications
Course
LLearnKartS
Course

Course