How to Secure your Network Device using Cisco Packet Tracer

Offered By
Coursera Project Network
In this Free Guided Project, you will:

In this Guided Project, you will be able to apply authentication on the switches in your network topology.

In this Guided Project, you will be able to apply authentication on the router in your network topology.

In this Guided Project, you will be able to configure DHCP on your router and secure the ports of your switch from the attackers.

Showcase this hands-on experience in an interview

Clock1 hour
BeginnerBeginner-friendly
CloudNo download needed
VideoSplit-screen video
Comment DotsEnglish
LaptopDesktop only

In this 1-hour long project-based course, you will create a network topology using cisco packet tracer. Throughout the project, you will be able to authenticate the switches and the router in your the network topology, make PCs from different VLANs communicate with each other, and Finally configure DHCP protocol on the router and be able to protect your switch ports from attackers. This guided project is for people who are interested in getting started in the network security field and for the people interested in computer networking architecture. This guided project will enhance your skills in the network security field as the security field is one of the most promising fields in the next few years.

Requirements

- Basic Knowledge of TCP/IP model

- Basic Knowledge of OSI layers

Skills you will develop

Network SecurityTesting connectivityConfiguringbuilding network topologiesTroubleshooting

Learn step-by-step

In a video that plays in a split-screen with your work area, your instructor will walk you through these steps:

  1. LO1: By the end of Task 1, you will be able to create your network topology using Cisco packet tracer.

  2. LO2: By the end of Task 2, you will be able to apply authentication on the switches in your network topology.

  3. LO3: By the end of Task 3, you will be able to apply authentication on the router in your network topology.

  4. LO4: By the end of Task 4, you will be able to make different PCs from different VLANs communicate with each other.

  5. LO5: By the end of Task 5, you will be able to configure DHCP on your router and secure the ports of your switch from the attackers.

How Guided Projects work

Your workspace is a cloud desktop right in your browser, no download required

In a split-screen video, your instructor guides you step-by-step

Frequently asked questions

Frequently Asked Questions

More questions? Visit the Learner Help Center.