Network Security - Introduction to Network Security

Academy
edX
Kurzbeschreibung

Learn fundamentals of network security, including a deep dive into how networks are attacked by malicious users.

Kursarten
E-Learning
Fachbereiche

Informatik, IT-Netzwerk, Cyber Security

Kurslevel
Fortgeschritten

Dieser Kurs ist neu hier. 0 User folgen diesem Kurs und erhalten Bescheid, wenn es Neues gibt - Kurs jetzt folgen.

Du hast den Kurs besucht? Kurs jetzt bewerten.

Hier kannst du der Eggheads Community deine Fragen zu diesem Kurs stellen. Auch Kursleiter können mitdiskutieren.


Frage stellen

Du must angemeldet sein um zu antworten

Kursinhalt
This is the 4th course in the intermediate, undergraduate-level offering that makes up the larger Cybersecurity Fundamentals MicroBachelors Program. We recommend taking them in order, unless you have a background in these areas already and feel comfortable skipping ahead. Information Security - Introduction to Information Security Information Security - Authentication and Access Control Information Security - Advanced Topics Network Security - Introduction to Network Security Network Security - Protocols Network Security - Advanced Topics Penetration Testing - Discovering Vulnerabilities Penetration Testing - Exploitation Penetration Testing - Post Exploitation These topics build upon the learnings that are taught in the introductory-level Computer Science Fundamentals MicroBachelors program, offered by the same instructor. This is a self-paced course that provides an introduction to network security topics. The curriculum focusses on how malicious users attack networks. The material is essential in later classes that will develop ethical hacking skills. Students are introduced to some key concepts in network security. Next, we provide an overview of network reconnaissance strategies. We move on to the next stage of the network attack methodology, which is exploitation. Next, we cover standard attack techniques, attacks such as Denial of Service, DNS attacks, and client-side attacks, and the tools used to carry out these exploitations. We conclude by focusing on the steps attackers take after they initially compromise a system.
Kurssprache
Englisch
Kursgebühr
USD 166