MOOC List is learner-supported. When you buy through links on our site, we may earn an affiliate commission.
MOOC List is learner-supported. When you buy through links on our site, we may earn an affiliate commission.
This is the 5th course in the intermediate, undergraduate-level offering that makes up the larger Cybersecurity Fundamentals MicroBachelors Program. We recommend taking them in order, unless you have a background in these areas already and feel comfortable skipping ahead.
- Information Security - Introduction to Information Security
- Information Security - Authentication and Access Control
- Information Security - Advanced Topics
- Network Security - Introduction to Network Security
- Network Security - Protocols
- Network Security - Advanced Topics
- Penetration Testing - Discovering Vulnerabilities
- Penetration Testing - Exploitation
- Penetration Testing - Post Exploitation
These topics build upon the learnings that are taught in the introductory-level Computer Science Fundamentals MicroBachelors program, offered by the same instructor.
This is a self-paced course that provides a continuation of network security topics. Among the topics covered are cryptographic algorithms used in networking protocols, TLS/SSL, IPSec Layer 2 Security, and Wireless Security. The material is essential in later classes that will develop ethical hacking skills. This is a self-paced course that provides a continuation of network security topics. Among the topics covered are cryptographic algorithms used in networking protocols, TLS/SSL, IPSec Layer 2 Security, and Wireless Security. The material is essential in later classes that will develop ethical hacking skills.
What you'll learn
1. Define and apply a substitution cipher
2. Define cryptanalysis
3. Explain at a high level the process by which a plaintext message is encrypted, transmitted, and decrypted.
4. Describe at least two strategies for breaking an encryption scheme
5. Identify the differences between public key encryption, symmetric key encryption, and hashing
6. List and summarize the characteristics of good ciphers
7. Describe the vulnerabilities of stream ciphers
8. Define AES and explain why it is recommended over 3DES
9. Define cipher block chaining
10. List the steps in creating an RSA public/private key pair
11. Explain why RSA is secure
12. Define message integrity and explain how it is ensured
13. Define IPSec and list its services
14. Define authentication header and ESP
15. Explain the primary goal of IKE and describe its sub-protocols
16. Summarize the five steps of IPSec Operation
17. Summarize the history of SSL
18. Explain how closure alerts can prevent a truncation attack
19. Identify the protocols that make up the SSL architecture
20. Describe how SSL/TLS provides protected channels
21. State the differences between IPSec and SSL VPN connections
22. Explain why it's important to consider Layer 2 security
23. Define common Layer 2 attacks
24. Identify tools used in Layer 2 attacks
25. Describe countermeasures to Layer 2 attacks and security best practices to prevent attacks
26. Explain the differences between the 2.4GHz and 5GHz spectrums
27. Provide definitions of basic wireless terms
28. Explain how 802.11ac differs from earlier 802.11 standards
29. Identify and define the types of 802.11 frames
30. List and define the states of 802.11 sessions
31. List the steps in establishing an 802.11 session
32. Summarize the existing wireless security protocols and state which protocols should not be used
33. Summarize WPA, WPA Enterprise, and generalized WiFi attacks
Syllabus
Week 1 - Cryptography
Week 2 - TLS/SSL and IPSec
Week 3 - Layer 2 Security
Week 4 - Wireless Security
Week 5 - Final Exam
MOOC List is learner-supported. When you buy through links on our site, we may earn an affiliate commission.
MOOC List is learner-supported. When you buy through links on our site, we may earn an affiliate commission.