quality replica watches
4.75(4)

#IT-04-19 Basics of Network Security

  • Categories IT
  • Duration 15h
  • Total Enrolled 8
  • Last Update September 25, 2020

About Course

Coventry University

Description

Understand the threats posed to organisations’ networks and how to secure them

On this course you will examine the theory and practice of network fundamentals from the defender’s and attacker’s perspectives. You will have the opportunity to use tools for networking that allow you to query services, test routing and more.

At the end of the course, you will have the opportunity to challenge yourself to a network security boot camp – can you work with a virtual networked device to make it secure?

What topics will you cover?

  • The basic principles of network security and cyber attacks
  • Real-world security case studies
  • Protecting assets
  • Intrusion detection systems
  • Assessing security threats from a practical and theoretical viewpoint

Who will you learn with?

Christo Panchev

Dr. Christo Panchev is a Senior Lecturer in Cyber Security at Coventry University with more than 20 years experience in industry and higher education, research and teaching in A.I. and Cyber Security.

 

John Filippas

Dr John Filippas is a Senior Lecturer in Computer Networking at Coventry University. His research interests include Biomedical Computing, Parallel Computing and Computer Games.

 

Antal Goldschmidt

If any problems/Questions email me: ab2216@coventry.ac.uk

Associate Lecturer, MSc Cybersecurity Coventry University Online

Deputy Course Director, Ethical Hacking and Cybersecurity Coventry University

 

 

Who developed the course?

Coventry University logo

Coventry secured gold in the UK Government’s 2017 Teaching Excellence Framework (TEF) and is University of the Year for Student Experience in The Times & The Sunday Times Good University Guide 2019.

What Will I Learn?

  • Describe the concepts of network security and cyber-attacks
  • Evaluate real-world security case studies
  • Apply cyber security principles to protect assets
  • Assess security threats from a practical and theoretical viewpoint

Topics for this course

16 Lessons15h

Welcome to the course?

We will look at the basic theory of computer networks and network devices. We will discuss the security challenges which today’s computer networks face and take the first steps into securing our network and devices.
Introduction
Getting the most out of your learning
What you will need
The big question

Introduction to computer networks?

Review the basic theory of computer networks and network devices. Discuss the security challenges which today’s computer networks face and take the first steps into securing our network and devices.

Set up a virtual lab?

Most of the practical lab exercises require virtual machines (VMs) running on your local computer or via remote login to our virtual cyber security lab. Instructions on how to do this are provided.

Scan your targets?

Look into the exposure of networked devices from a security point of view. See the exposure of services on a server with and without a firewall. Discuss security implications.

Basic security techniques?

One of the standard techniques in computer network perimeter security is the use of a firewall. We will discuss the main principles of firewall functionality and its applications.

Summary?

Reflect on the activities that you have done this and find out what is coming up next

Student Feedback

4.8

Total 4 Ratings

5
3 ratings
4
1 rating
3
0 rating
2
0 rating
1
0 rating

The course was very well organized, the summaries at the end of each session and at the end of the course were very helpful to digest and ensure understanding of the course modules

The course content progressed very nicely from the beginner phase to the more advanced.

This has been the BEST IT course I have ever taken. Very easy to listen to and watch, very logical progression of material and explanations and VERY INFORMATIVE.

I enjoyed the level of technical detail as this can often be missing from online intro courses.

$49

Material Includes

  • Official Certificate

Requirements

  • In order to complete the labs you will need a PC capable of running Virtual Machines (VMs). We recommend at least a dual core CPU and 8GB of memory. You would also need about 100GB of hard disk space to store the VMs.
  • In order to run the virtual machines you will need to download and install VMware Workstation Player (if you are running on Windows or Linux). It is free for non-commercial/educational use and you can get it from the VMware website. If you are running a Mac you will need VMware Fusion.
  • You will also use Linux. If you are not already familiar with the Linux environment and its command line, there are plenty of online resources and tutorials to get you started. We would recommend that you look into some of these before starting the modules. You need to be familiar with the core linux commands, input/output redirecting and piping, file manipulation, basic network configuration and user account management.

Target Audience

  • The Institute of Coding supported the development of this course in response to consultation with industry representatives from the healthcare, manufacturing and automotive sectors.
  • This course is designed for people familiar with basic computing who want to learn about the techniques and technologies of network security.
  • Please note that the individuals detailed in the ‘Who will you learn with?’ section below, are current staff members and may be subject to change.