Cisco Learning and Certifications

Network Security

Access provided by PSGR Krishnammal College for Women

52,483 already enrolled

Gain insight into a topic and learn the fundamentals.

737 reviews

1 week to complete
at 10 hours a week
Flexible schedule
Learn at your own pace
98%
Most learners liked this course
Gain insight into a topic and learn the fundamentals.

737 reviews

1 week to complete
at 10 hours a week
Flexible schedule
Learn at your own pace
98%
Most learners liked this course

See how employees at top companies are mastering in-demand skills

 logos of Petrobras, TATA, Danone, Capgemini, P&G and L'Oreal

Build your subject-matter expertise

This course is part of the Cybersecurity Operations Fundamentals Specialization
When you enroll in this course, you'll also be enrolled in this Specialization.
  • Learn new concepts from industry experts
  • Gain a foundational understanding of a subject or tool
  • Develop job-relevant skills with hands-on projects
  • Earn a shareable career certificate

There are 2 modules in this course

This foundational module provides you with a blueprint for modern network security architecture. We will start with essential network functions like Network Address Translation (NAT) and packet filtering with Access Control Lists (ACLs). You will then learn how to manage user and device permissions through Access Control Models and AAA (Authentication, Authorization, and Accounting). Finally, we'll examine the critical security technologies that protect and monitor the network, including load balancers, Web Application Firewalls, network-based malware protection, and various Network Security Monitoring (NSM) tools.

What's included

9 videos14 readings8 assignments

Building on your knowledge of network infrastructure, this module shifts focus to the offensive side of cybersecurity. You will learn to think like an attacker by dissecting the TCP/IP suite to expose common vulnerabilities in protocols like ARP, IP, ICMP, TCP, and UDP. We will analyze how these weaknesses are leveraged to launch real-world attacks, covering techniques for reconnaissance, gaining unauthorized access, and disrupting services through Man-in-the-Middle (MITM), spoofing, and Denial-of-Service (DoS) attacks.

What's included

16 videos29 readings15 assignments

Earn a career certificate

Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.

Instructor

Instructor ratings
(121 ratings)
Cisco Learning & Certifications
28 Courses100,456 learners

Offered by

Why people choose Coursera for their career

Felipe M.

Learner since 2018
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."

Jennifer J.

Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."

Larry W.

Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."

Chaitanya A.

"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."

Learner reviews

  • 5 stars

    82.76%

  • 4 stars

    15.06%

  • 3 stars

    1.49%

  • 2 stars

    0.13%

  • 1 star

    0.54%

Showing 3 of 737

RK

Reviewed on Oct 13, 2024

ZZ

Reviewed on Oct 18, 2023

YS

Reviewed on Jul 31, 2024

Explore more from Information Technology