In today’s interconnected world, secure network design is essential to organizational resilience. As networks expand across offices, plants, and data centers, cyber threats increasingly exploit vulnerabilities such as misconfigurations, weak segmentation, and unmonitored systems. This course equips learners with the skills to design, implement, and manage secure network infrastructures at every stage of their lifecycle.



Network Defense Strategies


Instructors: Ahmed Elhenedy
Access provided by L4G Solutions Private Limited
Recommended experience
What you'll learn
Apply secure design using threat modeling, VLANs, subnetting, and layered zones to control traffic and reduce enterprise risk.
Implement ACLs and VPNs to regulate traffic by IP, protocol, port, and encrypt data across public/private networks.
Configure AAA with TACACS+ to manage admin access and monitor network activity for threat detection and response.
Apply advanced techniques to design and validate a secured enterprise network using integrated prior skills.
Skills you'll gain
- Network Security
- Security Controls
- Network Architecture
- Network Planning And Design
- Incident Response
- Encryption
- Wireless Networks
- Network Monitoring
- Authentications
- Threat Management
- Authorization (Computing)
- Intrusion Detection and Prevention
- Identity and Access Management
- Cyber Security Strategy
- Virtual Private Networks (VPN)
- VPN Clients
- Firewall
- Threat Detection
- Continuous Monitoring
- Virtual Local Area Network (VLAN)
Details to know

Add to your LinkedIn profile
October 2025
See how employees at top companies are mastering in-demand skills

There are 6 modules in this course
In this course, you’ll learn how to design, implement, and manage secure network infrastructures that can withstand evolving cyber threats. You’ll focus on real-world applications such as network segmentation with VLANs, secure remote connectivity through VPNs, and proactive defense using firewalls, IDS/IPS, and SIEM systems. Through guided labs and hands-on configuration, you’ll gain the skills to build scalable, resilient networks, monitor traffic in real time, and apply layered security principles like zero trust and defense in depth—ensuring data integrity, confidentiality, and continuous protection across complex digital environments.
What's included
1 video1 reading
In this module, you’ll learn how to build secure network architectures from the ground up—starting with the foundational principles of network security and progressing to practical configuration of VLANs for segmentation and protection. You’ll explore key concepts such as the CIA triad, common cyberattack methods, and architectural design principles like defense in depth and least privilege. Through interactive lessons, hands-on VLAN labs, and demonstrations, you’ll gain the skills to design, implement, and secure segmented network environments that minimize attack surfaces and enhance organizational resilience.
What's included
10 videos1 reading1 assignment1 peer review1 discussion prompt
In this module, you’ll learn how to control who and what can access your network, secure data as it travels across untrusted environments, and harden network devices against unauthorized use. You’ll explore access control mechanisms like ACLs for filtering traffic, VPNs for encrypting communication, and secure authentication methods for device protection. Through real-world demonstrations, guided configurations, and hands-on labs, you’ll gain the skills to build, deploy, and manage secure access solutions that safeguard both internal and external network communications.
What's included
10 videos1 reading1 assignment1 peer review1 discussion prompt
In this module, you’ll learn how to centralize network authentication and gain full visibility into network activity through monitoring and analysis tools. You’ll configure AAA services using TACACS+ for secure and auditable user management, compare it with RADIUS, and implement centralized authorization policies. The module then guides you through traffic analysis and performance monitoring using Wireshark, NetFlow, and SNMP to detect anomalies and performance bottlenecks. Finally, you’ll integrate these insights into a layered defense strategy combining firewalls, IDS/IPS, and incident response to create a robust, proactive security posture.
What's included
10 videos1 reading1 assignment1 peer review1 discussion prompt
In this module, you’ll learn how to secure wireless networks and bring together all your skills in a comprehensive network security project. You’ll explore wireless-specific vulnerabilities and defenses, including rogue access point detection, WPA2/WPA3 encryption, and secure segmentation using VLANs and ACLs. The module also introduces wireless intrusion prevention and enterprise-level monitoring practices. It concludes with a capstone project where you’ll design, configure, and audit a fully secured network—integrating wired, wireless, and remote access components into one cohesive, defense-in-depth architecture.
What's included
10 videos1 reading1 assignment1 peer review1 discussion prompt
In this final section, you’ll synthesize your learning across access control, VPNs, centralized authentication, and wireless defense to build a complete enterprise security framework. You’ll complete a capstone project that challenges you to design, configure, and defend a fully secured network integrating VLANs, ACLs, VPNs, TACACS+, and monitoring tools. By applying your knowledge in a practical environment, you’ll demonstrate your ability to implement layered security, mitigate threats, and maintain resilient network operations across wired and wireless infrastructures.
What's included
1 video1 peer review
Instructors


Offered by
Why people choose Coursera for their career




Explore more from Information Technology
Âą Some assignments in this course are AI-graded. For these assignments, your data will be used in accordance with Coursera's Privacy Notice.





