Network architecture-Get started with the course
Introduction to Course 3
()
Course 3 overview
Helpful resources and tips
Network architecture- Introduction to networks
Welcome to module 1
()
Chris: My path to cybersecurity
()
What are networks?
()
Tina: Working in network security
()
Emmanuel: Useful skills for network security
()
Network tools
()
Network components, devices, and diagrams
Cloud networks
()
Cloud computing and software-defined networks
Network architecture-Network communication
Introduction to network communication
()
The TCP/IP model
()
The four layers of the TCP/IP model
()
Learn more about the TCP/IP model
The OSI model
Network architecture- Local and wide network communication
IP addresses and network communication
()
Components of network layer communication
Network architecture-Review: Network architecture
Wrap-up
()
Glossary terms from module 1
Network operations- Introduction to network protocols
Welcome to module 2
()
Network protocols
()
Common network protocols
Additional network protocols
Antara: Working in network security
()
Wireless protocols
()
The evolution of wireless security protocols
Network operations-System identification
Firewalls and network security measures
()
Virtual private networks (VPNs)
()
Security zones
()
Subnetting and CIDR
Proxy servers
()
Virtual networks and privacy
VPN protocols: Wireguard and IPSec
Network operations-Review: Network operations
Wrap-up
()
Glossary terms from module 2
Secure against network intrusions - Introduction to network intrusion tactics
Welcome to module 3
()
The case for securing networks
()
How intrusions compromise your system
Matt: A professional on dealing with attacks
()
Secure against network intrusions -Secure networks against Denial of Service (DoS) attacks
Denial of Service (DoS) attacks
()
Read tcpdump logs
Real-life DDoS attack
Activity Exemplar: Analyze network layer communication
Secure against network intrusions -Network attack tactics and defense
Malicious packet sniffing
()
IP Spoofing
()
Overview of interception tactics
Activity Exemplar: Analyze network attacks
Secure against network intrusions -Review: Secure against network intrusion
Wrap-up
()
Glossary terms from module 3
Security hardening-Introduction to security hardening
Welcome to module 4
()
Security hardening
()
Security hardening-OS hardening
OS hardening practices
()
Brute force attacks and OS hardening
Activity Exemplar: Apply OS hardening techniques
Security hardening-Network hardening
Network hardening practices
()
Network security applications
Activity Exemplar: Analysis of network hardening
Security hardening-Cloud hardening
Network security in the cloud
()
Kelsey: Cloud security explained
()
Secure the cloud
Cryptography and cloud security
Security hardening-Review: Security hardening
Wrap-up
()
Glossary terms from module 4
Portfolio Activity Exemplar: Use the NIST Cybersecurity Framework to respond to a security incident
Security hardening-Congratulations on completing Course 3!
Course wrap-up
()
Course 3 glossary
Get started on the next course